preview

Essay On Implicit Authentication

Good Essays

There are several efforts done to give solutions for restrictions on the implicit authentication. These efforts will be discussed in this section. Traditional authentication methods depend on possession of private data (i.e. passwords, pattern). Also, physiological biometrics based on algorithms that use distinct personal features, such as fingerprints or iris patterns. Lately, behavior-based authentication uses the private behavior for users, e.g., gestures and gaits. Currently, there are many different physiological biometrics for authentication, such as fingerprints and face patterns [2], and iris patterns [3]. However, physiology-based authentication requires user help in the authentication. For example, fingerprint authentication …show more content…

They review methods and features used for this field. They suggested an approach in which a user must enter gesture in any direction to build user’s model to be matched later through a score computation. However, no implementation is done to show accuracy achieved by the proposed framework.

Jain et al. [11] suggested an algorithm to compare the Equal Error Rates(EER) obtained from the touch screen sensor with the rates of keystrokes in hardware keyboard. A developed keyboard application replaces the system keyboard to capture features in any application that uses a keyboard. The features are then stored in a SQLite database and classified by a one-class SVM. This method achieved EER of 10.5% for keystroke data, 3.5% for touch data and 2.8% for all data (touch and keystroke). However, Additional sensors on the devices, such as gyroscopic and rotational sensors, are ignored in this study. These sensors could differentiate accurately touch data from the keyboard timing data.

Feng Yao el al [12] have proposed and evaluated a Fuzzy Logic based implicit authentication scheme for mobile access control. That can maintain a high recognition of legal user activities while enabling timely detection of adversary user behavior by feeding dynamically computed aggregate score and threshold-based parameters into Fuzzy Logic system to determine the trust status of current user activity. The proposed Fuzzy-Logic-based authentication

Get Access