Combining Hardwaremetry and Biometry for Human Authentication via Smartphones
نویسندگان
چکیده
The role of smartphones in our life is ever-increasing. They are used to store and share sensitive data and to perform security critical operation online e.g. home banking transaction or shopping. This leads to the need for a more secure authentication process via mobile phones. Biometrics could be the solution but biometric authentication systems via mobile devices presented so far still do not provide a good trade-off between ease of use and high security level. In this paper we analyze the combination of sensor recognition (hardwaremetry) and iris recognition (biometry) in order to provide a double check of user’s identity in one shot, i.e. a single photo of the eye captured by the Smartphone, without the need of additional or dedicated sensors. To the best of our knowledge, this is the first attempt to combine these two aspects.
منابع مشابه
Answering Incoming Call for Implicit Authentication Using Smartphone
Smartphones are being used to keep sensitive data and make private transaction other than making calls and receive short messages. Thus, authentication of the smartphones becomes very crucial and important aspect. However, users feel inconvenience and difficult with current authentication methods, from password up to physical biometrics. Implicit authentication system emerged intending to impro...
متن کاملBiometrics and Security in Smartphones
In this paper we look at the significance of biometrics, specifically fingerprint readers which have been implemented into smartphones, primarily the iPhone 5S. The security of the technology is presented and analyzed while the security breaches and hacks are demonstrated in detail. We look at secure options in Android vs. iOS. And we also look at the future of biometrics and soon to be wearabl...
متن کاملBiometric Authentication Methods on Smartphones: A Survey
Nowadays, users are starting to develop a symbiotic bound with their smartphones. Users continuously carry these devices and use them for daily communication activities and social network interactions. On the other hand, a smartphone is equipped with sensors that can infer not only information about the context (e.g., location), but also about its owner. Since smartphones handle a huge amount o...
متن کاملA Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملA Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کامل