Answering Incoming Call for Implicit Authentication Using Smartphone
نویسندگان
چکیده
Smartphones are being used to keep sensitive data and make private transaction other than making calls and receive short messages. Thus, authentication of the smartphones becomes very crucial and important aspect. However, users feel inconvenience and difficult with current authentication methods, from password up to physical biometrics. Implicit authentication system emerged intending to improve the security and convenience of the smartphone users. One of the approaches is considering the way users answer incoming phone calls using their smartphones. We study and evaluate the voice signal from users when answering incoming phone calls. Our study shows that the voice signals capable of authenticating the smartphone users. The experiment conducted shows a very high performance with 98.9% accuracy. These findings will promisingly augment that the novel implicit and transparent authentication system based on voices of answering incoming phone calls is feasible so that authentication of smartphone’s users become easier and unobtrusive.
منابع مشابه
Authentication through Smartwatch and Smartphone
Smartphones now-a-days are used mainly for surfing the web, checking social networks or playing games than making a phone call, which is only the fifth most frequent activity [5]. This means that users trust their smartphones to store and access sensitive data, ranging from contacts to financial details [3] (indeed 35% use their devices for online banking [2]). Moreover, a typical user now has ...
متن کاملEvaluating the Use of Autobiographical Memory for Authentication
This paper takes a first step in exploring what we call autobiographical authentication, using data about events and activities that are easily captured by smartphones and other devices as the basis for authentication. More specifically, this paper reports on two studies. The first study looked at understanding and categorizing what kinds of everyday memories people could recall, using the resu...
متن کاملMobile Device based Authentication
Smartphones now-a-days are used mainly for surfing the web, checking social networks or playing games than making a phone call, which is only the fifth most frequent activity [5]. This means that users trust their smartphones to store and access sensitive data, ranging from contacts to financial details [3] (indeed 35% use their devices for online banking [2]). Moreover, a typical user now has ...
متن کاملA TESLA-based mutual authentication protocol for GSM networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کاملPrivacy concerns of implicit secondary factors for web authentication
These implicit factors can help transform authentication from a binary decision problem (based on passwords alone) into a classification problem with a spectrum of possible decisions. For example, unusual values for implicit factors can be used as an indicator to detect merely suspicious logins for which additional explicit authentication actions (such as sending an SMS code) can be taken. Alte...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014