Skip to main content
Top

2019 | OriginalPaper | Chapter

Touch and Move: Incoming Call User Authentication

Authors : Aleksandr Eremin, Konstantin Kogos, Yana Valatskayte

Published in: Information Systems Security and Privacy

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This paper presents two methods of implicit authentication during answering an incoming call based on user behavior biometrics. Such methods allow to increase usability of authentication against common PIN or graphical password. Also, a concept of authentication system based on presented methods is proposed. The paper shows that user’s touch dynamics and movement of the hand towards the ear when accepting the call provide all necessary information for authentication and there is no need for user to enter a PIN or graphical password.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Smith, R.E.: Authentication: From Passwords to Public Keys. Williams Publishing House, Moscow (2002) Smith, R.E.: Authentication: From Passwords to Public Keys. Williams Publishing House, Moscow (2002)
3.
go back to reference Løge, M.D.: Tell Me Who You Are and I Will Tell You Your Unlock Pattern. Master of Science in Computer Science, Norwegian University of Science and Technology (2015) Løge, M.D.: Tell Me Who You Are and I Will Tell You Your Unlock Pattern. Master of Science in Computer Science, Norwegian University of Science and Technology (2015)
4.
go back to reference Eremin, A., Kogos, K.: Incoming call implicit user authentication - user authentication via hand movement pattern. In: Proceedings of 4th International Conference on Information Systems Security and Privacy, pp. 24–29. SCITEPRESS, Portugal (2018) Eremin, A., Kogos, K.: Incoming call implicit user authentication - user authentication via hand movement pattern. In: Proceedings of 4th International Conference on Information Systems Security and Privacy, pp. 24–29. SCITEPRESS, Portugal (2018)
5.
go back to reference Feng, T., et al.: Continuous mobile authentication using touchscreen gestures. In: Proceedings of IEEE Conference on Technologies for Homeland Security, pp. 12–18. IEEE, USA (2012) Feng, T., et al.: Continuous mobile authentication using touchscreen gestures. In: Proceedings of IEEE Conference on Technologies for Homeland Security, pp. 12–18. IEEE, USA (2012)
7.
go back to reference Maghsoudi, J., Tappert, C.: A behavioral biometrics user authentication study using motion data from android smartphones. In: Proceedings of European Intelligence and Security Informatics Conference, pp. 184–187. IEEE, Sweden (2016) Maghsoudi, J., Tappert, C.: A behavioral biometrics user authentication study using motion data from android smartphones. In: Proceedings of European Intelligence and Security Informatics Conference, pp. 184–187. IEEE, Sweden (2016)
8.
go back to reference Conti, M., Zachia-Zlatea, I., Crispo, B.: Mind how you answer me! In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, pp. 249–259. ACM, China (2011) Conti, M., Zachia-Zlatea, I., Crispo, B.: Mind how you answer me! In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, pp. 249–259. ACM, China (2011)
9.
go back to reference Buriro, A., Crispo, B., Zhauniarovich, Y.: Please hold on: unobtrusive user authentication using smartphone’s built-in sensors. In: Proceedings of IEEE International Conference on Identity, Security and Behavior Analysis, pp. 1–8. IEEE, India (2017) Buriro, A., Crispo, B., Zhauniarovich, Y.: Please hold on: unobtrusive user authentication using smartphone’s built-in sensors. In: Proceedings of IEEE International Conference on Identity, Security and Behavior Analysis, pp. 1–8. IEEE, India (2017)
10.
go back to reference Frank, M., et al.: Touchalytics: on the applicability of touchscreen input as a behavioral biometric for continuous authentication. Trans. Inf. Forensic. Secur. 8(1), 136–148 (2013)CrossRef Frank, M., et al.: Touchalytics: on the applicability of touchscreen input as a behavioral biometric for continuous authentication. Trans. Inf. Forensic. Secur. 8(1), 136–148 (2013)CrossRef
Metadata
Title
Touch and Move: Incoming Call User Authentication
Authors
Aleksandr Eremin
Konstantin Kogos
Yana Valatskayte
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-25109-3_2

Premium Partner