Continuous User Identity Verification Based Secure Internet Services

نویسنده

  • G. Michael
چکیده

We explore the continuous user verification for the secure internet services using biometrics in the session management. We have used the novel biometric modality named “Facial Recognition” for continuous user authentication. Given a camera pointing towards the user, we develop real-time facial recognition algorithm (CMM-Correlation Matrix memories) to automatically extract facial recognition as frames patterns using FPS (frames per second) concept. Unlike the typical continuous biometrics such as keystroke dynamics (KD), Facial recognition provides reliable authentication with a short delay, while avoiding explicit key-logging. For one second 30 frames of user face reaction will be captured and a unique descriptor is extracted based on the shape and position of face, as well as their temporal dynamics in the photo frame sequence. We implement the continuous authentication in online banking for secure services.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Flexible and Transparent User Authentication for Mobile Devices

The mobile device has become a ubiquitous technology that is capable of supporting an increasingly large array of services, applications and information. Given their increasing importance, it is imperative to ensure that such devices are not misused or abused. Unfortunately, a key enabling control to prevent this, user authentication, has not kept up with the advances in device technology. This...

متن کامل

Identity verification based on certificateless public key cryptography

Verification of claimed identity becomes a problem of growing significance nowadays, as the number of e-commerce transactions grows rapidly and new information distribution channels are created by companies and institutions of all kinds. As most of them rely or make a use of a public network, such as the Internet, security of transferred data and information in most cases requires authorization...

متن کامل

Secure Digital Certificate Design Based on the RSA Algorithm

With the popularity of the Internet, people can purchase and sell goods and services online just staying at home, and this trend is becoming increasingly apparent. The Internet, as a global computer network, has to provide the following five services: security, data integrity, authentication, usability, and reliable information. In case of lack of safety measures, Internet trading risk is very ...

متن کامل

An Efficient Secret Sharing-based Storage System for Cloud-based Internet of Things

Internet of things (IoTs) is the newfound information architecture based on the internet that develops interactions between objects and services in a secure and reliable environment. As the availability of many smart devices rises, secure and scalable mass storage systems for aggregate data is required in IoTs applications. In this paper, we propose a new method for storing aggregate data in Io...

متن کامل

The Sb & ? Lrt Diskette

(i) Identity verification of the user, for controlling access both to resources within the local PC workstation and to remote teleprocessing services on other machines. (ii) File encryption at the PC for secure storage. (iii) Message encryption and message authentication for secure communications. (iv) Digital signatures for proof of origin of communications and for data and software certificat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015