Title | ||
---|---|---|
Continuous Remote Mobile Identity Management Using Biometric Integrated Touch-Display |
Abstract | ||
---|---|---|
While enriching the user experiences, the development of mobile devices and applications introduces new security and privacy vulnerabilities for the remote services accessed by mobile device users. A trusted and usable authentication architecture for mobile devices is thus in high demand. In this paper,we leverage a unified structure, consisting of transparent TFT based fingerprint sensors, touchscreen, and display, to propose a novel identity management mechanism that authenticates usersof touch based mobile devices for accessing the local devices and remote services. Our solution differs from the previous one time and enforced authentication approaches through two novel features: (i) user transparent authentication process, requiring neither password nor extra login steps and (ii) continuous identity management based on fingerprint biometric, where each user-to-device touch interaction is used toward authentication.Moreover, we introduce two different security scenarios, one for local identity management, and the second extended solution for remote identity management. Finally we employ TRUST (Trust Reinforcement based on Unified Structural Touch-display) to solve the identity challenge in cyber space. |
Year | DOI | Venue |
---|---|---|
2012 | 10.1109/MICROW.2012.9 | MICRO Workshops |
Keywords | Field | DocType |
anovel identity management mechanism,cyber space identity challenge,continuous remote mobile identity,fingerprint identification,privacy vulnerabilities,touchscreen,user experiences,mobile device,data privacy,continuousidentity management,security vulnerabilities,user transparent authentication process,biometric integrated touch-display,transparent tft-based fingerprint sensors,authentication approach,user-to-device touch interaction,trusted computing,usable authentication architecture,extended solution forremote identity,identity challenge,touch sensitive screens,developmentof mobile device,local identity management,enforced authentication approaches,remote services,mobile device online authentication,authorisation,continuous implicit authentication,authentication architecturefor mobile device,forlocal identity management,touch based mobile devices,trusted authentication architecture,trust reinforcement based on unified structural touch-display,trust,continuous remote mobile identity management mechanism,mobile device users,biometric touch-display,mobile computing | Mobile identity management,Mobile computing,Trusted Computing,Authentication,Computer security,Computer science,Login,Identity management,Mobile device,Password | Conference |
ISBN | Citations | PageRank |
978-1-4673-4920-8 | 5 | 0.57 |
References | Authors | |
16 | 5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Tao Feng | 1 | 49 | 2.60 |
Ziyi Liu | 2 | 39 | 4.18 |
Bogdan Carbunar | 3 | 699 | 53.79 |
Dainis Boumber | 4 | 8 | 1.95 |
Weidong Shi | 5 | 331 | 41.44 |