Goicoechea-Telleria et al., 2018 - Google Patents
Attack potential evaluation in desktop and smartphone fingerprint sensors: can they be attacked by anyone?Goicoechea-Telleria et al., 2018
View PDF- Document ID
- 17748745091080790093
- Author
- Goicoechea-Telleria I
- Sanchez-Reillo R
- Liu-Jimenez J
- Blanco-Gonzalo R
- Publication year
- Publication venue
- Wireless Communications and Mobile Computing
External Links
Snippet
The use of biometrics keeps growing. Every day, we use biometric recognition to unlock our phones or to have access to places such as the gym or the office, so we rely on the security manufacturers offer when protecting our privileges and private life. It is well known that it is …
- 238000011156 evaluation 0 title description 48
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Dasgupta et al. | Advances in user authentication | |
| Andress | Foundations of information security: a straightforward introduction | |
| Tittle et al. | CISSP: Certified information systems security professional study guide | |
| Lovisotto et al. | Mobile biometrics in financial services: A five factor framework | |
| Moallem | Human-Computer Interaction and cybersecurity handbook | |
| CN107025397A (en) | The acquisition methods and device of identity information | |
| TW202312058A (en) | Decentralized zero-trust identity verification-authentication system and method | |
| Sharma et al. | A survey on blockchain deployment for biometric systems | |
| Bodepudi et al. | Spoofing attacks and mitigation strategies in biometrics-as-a-service systems | |
| Gordon et al. | The Official (ISC) 2 guide to the SSCP CBK | |
| 홍성혁 | New Authentication Methods based on User’s Behavior Big Data Analysis on Cloud | |
| Goicoechea-Telleria et al. | Attack potential evaluation in desktop and smartphone fingerprint sensors: can they be attacked by anyone? | |
| Furnell | Securing information and communications systems: Principles, technologies, and applications | |
| Lone et al. | Smartphone-based biometric authentication scheme for access control management in client-server environment | |
| Algarni | An Extra Security Measurement for Android Mobile Applications Using the Fingerprint Authentication Methodology | |
| Goicoechea-Telleria et al. | Analysis of the attack potential in low cost spoofing of fingerprints | |
| Goicoechea-Telleria et al. | Vulnerabilities of Biometric Systems integrated in Mobile Devices: an evaluation | |
| Henniger et al. | On security evaluation of fingerprint recognition systems | |
| Dasgupta et al. | Authentication Basics: Key to the kingdom–Access a Computing System | |
| Sabater | Biometrics as password alternative | |
| Toli et al. | Secure and Privacy-Preserving Biometric Systems | |
| Al Abdulwahid | Federated authentication using the cloud (Cloud Aura) | |
| Bader et al. | Identity management in virtual worlds based on biometrics watermarking | |
| Furnell | Biometric technology and user identity | |
| Morris | To Be, To Have, To Know: Smart Ledgers & Identity Authentication |