Next Level User Authentication in Android
نویسندگان
چکیده
1 Pulkit Tandon, 2 Geogen George 1 M.Tech Scholar, 2 Assistant Professor 1 I.T Dept., SRM University, Chennai, Tamil Nadu, India 2 I.T Dept., SRM University, Chennai, Tamil Nadu, India [email protected], [email protected] ________________________________________________________________________________________________________ Abstract: Device security are the major challenges faced by the smartphone developers in the recent era to secure the E-Data from security breaches. The finest possible alternative present due to limited range of current methods is to concatenate existing data security method with novel procedures which should be quick-to-implement and at the same time should be highly secure. The paper aims to strengthen the data security on the device by creating a custom user for the device other than the device administrator. The administrator is authenticated through speech recognition and pattern recognition methods whereas the custom user is verified using PIBRAS.
منابع مشابه
Towards secure and usable user athentication on mobile devices
Nowadays, mobile devices like smartphones and tablets can be found everywhere, they are truly ubiquitous. These devices often contain many private information, such as contact data, pictures, and emails. Interestingly, many users do not realize the true value of their data. However, such data plays an important role not only for secret services or companies in order to create user profiles but ...
متن کاملBreaking Cell Phone Authentication: Vulnerabilities in AKA, IMS, and Android
Next generation IP telephony such as the IP Multimedia Subsystem (IMS) framework has been used to create Internet calling services which let cellular users make and receive calls even when without cellular reception. In this paper, we look at the security aspects of Internet calling services and other systems that use the 3GPP Authentication and Key Agreement (AKA) protocol for authentication, ...
متن کاملRESCUE: Reputation based Service for Cloud User Environment
Exceptional characteristics of Cloud computing has replaced all traditional computing. With reduced resource management and without in-advance investment, it has been victorious in making the IT world to migrate towards it. Microsoft announced its office package as Cloud, which can prevent people moving from Windows to Linux. As this drift is escalating in an exponential rate, the cloud environ...
متن کاملTouch Gestures Based Biometric Authentication Scheme for Touchscreen Mobile Phones
Nowadays, touchscreen mobile phones make up a larger and larger share in the mobile market. Users also often use their mobile phones (e.g., Android phones) to store personal and sensitive data. It is therefore important to safeguard mobile phones by authenticating legitimate users and detecting impostors. In this paper, we propose a novel user authentication scheme based on touch dynamics that ...
متن کاملPoster: Preliminary Investigation of an NFC-Unlock Mechanism for Android
Protecting mobile phones with password, pins, gestures and other types of authentication mechanisms is a hot topic, since ever more sensitive information is stored on peoples’ phones and the usability of current systems still leaves much to be desired[3]. New techniques of authentication to a phone unlocking it which are fast, easy to use and secure are needed [1]. In this poster we present a p...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014