Secure Strokes A Security Mechanism for Authentication in Mobile Devices using User s Behavioral Pattern of Keystrokes Dynamics with Visual Cues

Size: px
Start display at page:

Download "Secure Strokes A Security Mechanism for Authentication in Mobile Devices using User s Behavioral Pattern of Keystrokes Dynamics with Visual Cues"

Transcription

1 Secure Strokes A Security Mechanism for Authentication in Mobile Devices using User s Behavioral Pattern of Keystrokes Dynamics with Visual Cues Pallavica Sahoo MCA, VIT University, Vellore pallavica.sahoo123@gmail.com Prithumit Deb B.Tech IT, VIT University, Vellore prithumitls@gmail.com ABSTRACT The aim is to develop a security system for mobile devices that eliminates the vulnerability of PIN (4-digit) security and which reduces the high end configuration and memory space requirements of biometrics security. The issues that we will be handling in the project work is the vulnerability of PIN security in mobile devices and providing an extra layer of security through Key Strokes Dynamics based authentication system. Also the problem of authentication error rates while using natural user keystroke pattern will be worked upon. And a better mechanism which uses an artificial keystroke rhythm with cues will be worked upon. Method- Keystroke Dynamics based Authentication Security system for Mobile Devices using Artificial typing rhythm and cues. Principle- Making use of the behavioral pattern of the user rather than any physical pattern or biometrics. 1. LITERATURE SURVEY / RELATED WORKS Paper Title with Authors, and year Specific problems/issues discussed Problem statement Assumptions Keystroke dynamics-based authentication for mobile devices. (Seong-seob Hwang, Sungzoon Cho, Sunghoon Park) Keystroke dynamics based authentication for mobile devices. Data security through keystrokes dynamics based authentication User acquaintance with typing in Keystroke Dynamics as a Biometric for Authentication (Fabian Monrose, Aviel D. Rubin) Security threats to a computer and using biometrics to increase the level of security Result on the Authentication based on Keystrokes dynamics and comparison of the experiment results with the prior works Users are familiar with computers and mobile keypad Constraints Limited user group for the experiment Process or Keystrokes operation or Dynamics based functional Authentication description Claimed Less advantages configuration and memory Claimed disadvantages Tools used space required Difficult to implement for a larger and diverse set of users with varying typing pattern 3G synchronized IMT-2000 cellular system passwords Limitation of user group for data collection The problem with keystroke recognition is that unlike other non-static biometrics there are no known features or feature transformations which are dedicated solely to carrying discriminating information. MATLAB, C++, GNU plot 6

2 (CDMA2000 1xEV-DO) Tables and Choice of fields Passwords and use of typing hands, Equal Error rates, factors affecting error rates Domain tested Domain of 25 users with average age 25.3 yrs Metrics used with formula Performance graphs Future proposed work Cumulative distribution of enroll, login and imposter distances Applying the same theory to a more diverse user group 2. ANALYSIS & DESIGN Data collected 63 users Euclidean Distance measure, weighted weighted probability The system design is split into two major parts. was from Non and Recognition based on freetext typing pattern during the identification process Enrollment Process for the user Natural Rhythm Keystrokes Artificial Rhythm Keystrokes Login and Authentication time out of 10 sec is used. The 4 discrete points S 1, S 2, S 3, S 4 are taken and a arbitrary quadrilateral is formed whose area is calculated and the average area of the 4 are taken A avg and the deviation in his typing pattern is found out Deviation = Max(A 1, A 2, A 3 A 4 )- Min(A 1, A 2, A 3 A 4 ) Artificial Rhythm Keystrokes with visual cues Here the same is done as Natural Rhythm Keystroke with a major difference that visual color cues (red, orange, yellow) are used so that the user can remember his typing pattern and a more consistency is obtained. Here the x value is according to the color (pattern) that the user is following. 2.2 Login and Authentication Process The Average Quadrilateral Area A avg for the natural rhythm and artificial rhythm with their Deviation is determined and stored in the local RMS database and a threshold T is determined. The user when tries to login first has to pass through the password validation and in next stage the user is asked to type the password either in his natural rhythm or artificial rhythm with visual cues. The A avg is determined again using the same Varignon Parallelogram method. It is checked if it lies within the threshold value T and the user is authenticated if he satisfies the threshold limit Mathematical Models and Formula used Here the Varignon Parallelogram Method for calculating the area of arbitrary quadrilateral using Midpoint Theorem 2.1 Enrollment Process The enrollment process is started by collecting the basic profile data from the user i.e. Name, username, security PIN (4 digits).then follows the process of enrolling his keystroke pattern using the two methods Natural Rhythm Keystrokes without cues The user is asked to type his PIN in his natural typing rhythm (4 times) and his typing pattern is recorded. S(x, y) is taken as some discrete coordinates where x=the key pressed and y= the key press timings of the user. A Fig 1: Arbitrary Quadrilateral Area Calculation (Varignon Method) From elementary geometry, we know that in triangle V 0 V 1 V 2 the midpoint line M 0 M 1 is parallel to the base V 0 V 2. In triangle V 0 V 1 V 2 V 3, the line M 3 M 2 is 7

3 parallel to that same base V 0 V 2. Thus, M 0 M 1 and M 3 M 2 are parallel to each other. Similarly, M 0 M 3 and M 1 M 2 are parallel, which shows that M 0 M 1 M 2 M 3 is a parallelogram. The area relation is also easy to demonstrate, and we can compute the quadrilateral's area as: Area=2*Area (M0 M1 M2 M3) =2* (M3 M0) (M1 - M0) =2* ((V1+V2)/2-(V0+V1)/2)*((V3+V0)/2-(V0+V1)/2) =1/2 (V2-V0) * (V3-V1) Mathematical Comparison and Analysis of Probability But if we are using the key stroke pattern authentication method using artificial visual cues (3- colors) and a 10 sec timeout then the number of combination becomes * 3 4 * 10C 4 = * 81 * 210 = * combinations. So we can see that this method reduces the vulnerability of PIN (4 digits) by increasing the number of combinations by times, thus reducing the probability of an imposter accessing the data illegally. So this method can be considered as a better security technique. If we are using the normal PIN authentication and assume that it is of 4 digits P 1 P 2 P 3 P 4. Then the total combinations that can be formed are (0-9 digits). 3. SYSTEM DESIGN 8

4 4. IMPLEMENTATION MODULES 4.1 The GUI module: In this module the user is presented with an interface where he can enter details so as to create a profile for himself. The user is asked to provide his name, the username he wishes to login with and his password to login into the system. The user is asked to enter his password twice in order to double check it. The info entered here is stored in the database against the name of the user along with other details that include data related to his natural and artificial rhythm. 4.2 The Natural rhythm module: In this module the user enters the password so as data related to his natural rhythm can be calculated. As the user presses the key, the key he enters and the time difference between key presses is calculated and based on this a set of 4 values is generated. Each sets has two elements the key pressed and the time difference which are used to plot a virtual quadrilateral whose area is calculated using Varignon Parallelogram method and this area is what identifies each users keystrokes as unique. This whole process of entering the keystrokes and calculating the data is repeated four times and based on these four set of values other values like mean deviation and all are calculate in order to create the user's profile. 4.3 The Artificial rhythm with cues module: This module provides the user with visual cues that help him improve periodicity of his keystrokes so that the method can become more accurate and reliable. Also providing the user with cues of different color (three colors) increases the combinations that can be generated by the standard 4-digit pins used in mobiles by approximately times. This combined with the improved periodicity of the keystrokes provides the user with a new level of security. 4.4 The XML Connectivity module and Authentication: All the details produced by the above three modules will be stored in a XML file (using JSR 172 Web Services and XML Parsing API) with the threshold values in order to provide some relaxation to the user in terms of typing periodicity so as to avoid false rejects. Below a sample XML file generated after the enrollment process is shown. <?xml version="1.0"?> <prit> <password>1234</password> <area>0.52</area> <min>0.16</min> <max>0.15</max> </prit> The J2ME XML Parsing API is used to parse the XML file with the root tag denoting the username and the other information are retrieved using the XML parser and compared with the information that user has entered while login process. If the value of the area calculated during login lies between the retrieved area threshold value from the XML file then the user is authenticated else the authentication is rejected. 5. HARDWARE AND SOFTWARE REQUIREMENTS 5.1 Hardware Specifications Multimedia GSM Cell phones supporting J2ME with CLDC 1.1 supports and MIDP 2.0 and multimedia support J2ME MMAPI 5.2 Database and Software 1. Database containing the user s enrolment and login information and his keystroke patterns are stored in RMS (Record Management System) which is a local storage database provided by J2ME itself. 2. Software Building and testing Platform- J2ME 3. Software-Emulator used is Sun JAVA Wireless Toolkit CONCLUSION This new method of authentication using keystroke dynamics is acceptably far more efficient than the existing PIN authentication method. Also it is less resource and memory consuming than the biometrics methods (often an extra device is required in biometrics). The artificial rhythm with cues makes this KDA more unique and consistent and far more secure. Here the project is made using only a limited group of users. There could be a problem in fixing an accurate threshold value, there for the FAR (False Acceptance Rate) or FRR (False Rejection Rate) may vary inconsistently. Security is a matter of concern for mobile devices. But a security method that is applicable to the general mobile users, users of diverse groups should be developed keeping in mind the limited configuration, resources and memory that can be used in mobile devices. 9

5 7. SCREENSHOTS Fig 2- initial screen Fig 4- enrolling keystroke pattern Fig 3- profile creation screen Fig 5- area and statistics 10

6 REFERENCES 1. Keystroke dynamics-based authentication for mobile devices. (Seong-seob Hwang, Sungzoon Cho, Sunghoon Park) Keystroke Dynamics as a Biometric for Authentication (Fabian Monrose, Aviel D. Rubin) /parsingxml jsp Fig 6- login screen Fig 7- Natural rhythm enrollment 11

User Authentication using Combination of Behavioral Biometrics over the Touchpad acting like Touch screen of Mobile Device

User Authentication using Combination of Behavioral Biometrics over the Touchpad acting like Touch screen of Mobile Device 2008 International Conference on Computer and Electrical Engineering User Authentication using Combination of Behavioral Biometrics over the Touchpad acting like Touch screen of Mobile Device Hataichanok

More information

Mobile Operating Systems. Week I

Mobile Operating Systems. Week I Mobile Operating Systems Week I Overview Introduction Mobile Operating System Structure Mobile Operating System Platforms Java ME Platform Palm OS Symbian OS Linux OS Windows Mobile OS BlackBerry OS iphone

More information

Personal Identification Techniques Based on Operational Habit of Cellular Phone

Personal Identification Techniques Based on Operational Habit of Cellular Phone Proceedings of the International Multiconference on Computer Science and Information Technology pp. 459 465 ISSN 1896-7094 c 2006 PIPS Personal Identification Techniques Based on Operational Habit of Cellular

More information

User Authentication Methods for Mobile Systems Dr Steven Furnell

User Authentication Methods for Mobile Systems Dr Steven Furnell User Authentication Methods for Mobile Systems Dr Steven Furnell Network Research Group University of Plymouth United Kingdom Overview The rise of mobility and the need for user authentication A survey

More information

Deployment of Keystroke Analysis on a Smartphone

Deployment of Keystroke Analysis on a Smartphone Deployment of Keystroke Analysis on a Smartphone A. Buchoux 1 and N.L. Clarke 1,2 1 Centre for Information Security & Network Research, University of Plymouth, Plymouth, UK info@cisnr.org 2 School of Computer

More information

The Implementation of Face Security for Authentication Implemented on Mobile Phone

The Implementation of Face Security for Authentication Implemented on Mobile Phone The Implementation of Face Security for Authentication Implemented on Mobile Phone Emir Kremić *, Abdulhamit Subaşi * * Faculty of Engineering and Information Technology, International Burch University,

More information

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 10 Authentication and Account Management

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 10 Authentication and Account Management Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 10 Authentication and Account Management Objectives Describe the three types of authentication credentials Explain what single sign-on

More information

Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means.

Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means. Definition Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means. Description Physiological biometrics is based

More information

IDRBT Working Paper No. 11 Authentication factors for Internet banking

IDRBT Working Paper No. 11 Authentication factors for Internet banking IDRBT Working Paper No. 11 Authentication factors for Internet banking M V N K Prasad and S Ganesh Kumar ABSTRACT The all pervasive and continued growth being provided by technology coupled with the increased

More information

Mobile-PC Suite: Using Mobile Phone as Remote to Control PC Operations

Mobile-PC Suite: Using Mobile Phone as Remote to Control PC Operations Mobile-PC Suite: Using Mobile Phone as Remote to Control PC Operations R.S.S.Vishnu Priya, P.Panini Sai, K.Ruth Ramya, N.Chandra Sekhar, K.Venkata Prasad, P.D.Nageswara Rao Dept. of CSE, KLCE Vaddeswaram,

More information

This method looks at the patterns found on a fingertip. Patterns are made by the lines on the tip of the finger.

This method looks at the patterns found on a fingertip. Patterns are made by the lines on the tip of the finger. According to the SysAdmin, Audit, Network, Security Institute (SANS), authentication problems are among the top twenty critical Internet security vulnerabilities. These problems arise from the use of basic

More information

TIBCO Spotfire Metrics Modeler User s Guide. Software Release 6.0 November 2013

TIBCO Spotfire Metrics Modeler User s Guide. Software Release 6.0 November 2013 TIBCO Spotfire Metrics Modeler User s Guide Software Release 6.0 November 2013 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO SOFTWARE

More information

Voice Authentication for ATM Security

Voice Authentication for ATM Security Voice Authentication for ATM Security Rahul R. Sharma Department of Computer Engineering Fr. CRIT, Vashi Navi Mumbai, India rahulrsharma999@gmail.com Abstract: Voice authentication system captures the

More information

Java ME Clients for XML Web Services

Java ME Clients for XML Web Services 66 Java ME Clients for XML Web Services Paul POCATILU Academy of Economic Studies, Bucharest Using Web services in developing applications has many advantages like the existence of standards, multiple

More information

USING MYWEBSQL FIGURE 1: FIRST AUTHENTICATION LAYER (ENTER YOUR REGULAR SIMMONS USERNAME AND PASSWORD)

USING MYWEBSQL FIGURE 1: FIRST AUTHENTICATION LAYER (ENTER YOUR REGULAR SIMMONS USERNAME AND PASSWORD) USING MYWEBSQL MyWebSQL is a database web administration tool that will be used during LIS 458 & CS 333. This document will provide the basic steps for you to become familiar with the application. 1. To

More information

The Development of a Pressure-based Typing Biometrics User Authentication System

The Development of a Pressure-based Typing Biometrics User Authentication System The Development of a Pressure-based Typing Biometrics User Authentication System Chen Change Loy Adv. Informatics Research Group MIMOS Berhad by Assoc. Prof. Dr. Chee Peng Lim Associate Professor Sch.

More information

Location-Based Information Systems

Location-Based Information Systems Location-Based Information Systems Developing Real-Time Tracking Applications Miguel A Labrador Alfredo J Perez Pedro M Wightman CRC Press Taylor & Francis Group Boca Raton London New York CRC Press Is

More information

Wireless Java Programming for Enterprise Applications

Wireless Java Programming for Enterprise Applications Wireless Java Programming for Enterprise Applications Mobile Devices Go Corporate Dan Harkey Shan Appajodu Mike Urkin WILEY PUBLISHING, INC. Jl. ^E^.^l.^ Contents Foreword Preface v vii Part 1. Technologies

More information

Nokia 9210i/9290 Communicators and PersonalJava TM Application Development

Nokia 9210i/9290 Communicators and PersonalJava TM Application Development Nokia 9210i/9290 Communicators and Personal TM Application Development 05-03-2002 Nokia 9210i/9290 Communicators and PersonalTM Application Development Table of contents 1. DIFFERENT JAVA TECHNOLOGIES...

More information

Secure Web Access Solution

Secure Web Access Solution Secure Web Access Solution I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. E-CODE SECURE WEB ACCESS SOLUTION... 3 OVERVIEW... 3 PKI SECURE WEB ACCESS... 4 Description...

More information

Dr. Pat Mirenda. Software Design Specification Document

Dr. Pat Mirenda. Software Design Specification Document CPSC 319 Team 2 Dr. Pat Mirenda Software Design Specification Document Version: 1.2 Date: (03/17/2006) 2Communicate SDS Revisions Version Primary Author(s) Description of Version Date Completed 1.0 Wei

More information

Development of Java ME

Development of Java ME Y39PDA Development of Java ME application České vysoké učení technické v Praze Fakulta Elektrotechnická Content What is Java ME Low Level a High Level API What is JSR LBS Java ME app. life-cycle 2/29 Is

More information

Kaseya 2. User Guide. for Network Monitor 4.1

Kaseya 2. User Guide. for Network Monitor 4.1 Kaseya 2 Ping Monitor User Guide for Network Monitor 4.1 June 5, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.

More information

BehavioSec participation in the DARPA AA Phase 2

BehavioSec participation in the DARPA AA Phase 2 BehavioSec participation in the DARPA AA Phase 2 A case study of Behaviometrics authentication for mobile devices Distribution Statement A (Approved for Public Release, Distribution Unlimited) 1 This paper

More information

Time Monitoring Tool Software Requirements Specifications. Version <1.0>

Time Monitoring Tool Software Requirements Specifications. Version <1.0> Time Monitoring Tool Software Requirements Specifications Version Revision History Date Version Description Author First version Martin Robillard Page 2 of 18 Table of Contents

More information

An in-building multi-server cloud system based on shortest Path algorithm depending on the distance and measured Signal strength

An in-building multi-server cloud system based on shortest Path algorithm depending on the distance and measured Signal strength IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 1, Ver. I (Jan Feb. 2015), PP 38-42 www.iosrjournals.org An in-building multi-server cloud system based

More information

Your Mobile Phone as a Ticket (NFC)

Your Mobile Phone as a Ticket (NFC) Your Mobile Phone as a Ticket (NFC) Francisco Maria van Uden Chaves IST - Technical University of Lisbon Av. Prof. Cavaco Silva Tagus Park 2780-990 Porto Salvo, Portugal francisco.chaves@ist.utl.pt Abstract.

More information

Near Optimal Solutions

Near Optimal Solutions Near Optimal Solutions Many important optimization problems are lacking efficient solutions. NP-Complete problems unlikely to have polynomial time solutions. Good heuristics important for such problems.

More information

Kaseya 2. Quick Start Guide. for Network Monitor 4.1

Kaseya 2. Quick Start Guide. for Network Monitor 4.1 Kaseya 2 VMware Performance Monitor Quick Start Guide for Network Monitor 4.1 June 7, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private

More information

XpoLog Center Suite Log Management & Analysis platform

XpoLog Center Suite Log Management & Analysis platform XpoLog Center Suite Log Management & Analysis platform Summary: 1. End to End data management collects and indexes data in any format from any machine / device in the environment. 2. Logs Monitoring -

More information

Real time vehicle tracking and driver behaviour monitoring using cellular handset based accelerometer and GPS data

Real time vehicle tracking and driver behaviour monitoring using cellular handset based accelerometer and GPS data Real time vehicle tracking and driver behaviour monitoring using cellular handset based accelerometer and GPS data 4 th Year Electronic and Computing Project Report 05416361 Supervisor: Mr Liam Kilmartin

More information

International Journal of Innovative Research in Computer and Communication Engineering

International Journal of Innovative Research in Computer and Communication Engineering Authentication System for Online Banking Application by Using Keystroke Dynamic on Android Phones Dnyaneshwari S. Dhundad, Prof. D. N. Rewadkar Post Graduate Student, Dept. of Computer Engineering, RMD

More information

Biometric Authentication using Online Signature

Biometric Authentication using Online Signature University of Trento Department of Mathematics Outline Introduction An example of authentication scheme Performance analysis and possible improvements Outline Introduction An example of authentication

More information

Biometric SSO Authentication Using Java Enterprise System

Biometric SSO Authentication Using Java Enterprise System Biometric SSO Authentication Using Java Enterprise System Edward Clay Security Architect edward.clay@sun.com & Ramesh Nagappan CISSP Java Technology Architect ramesh.nagappan@sun.com Agenda Part 1 : Identity

More information

Dimension Technology Solutions Team 2

Dimension Technology Solutions Team 2 Dimension Technology Solutions Team 2 emesa Web Service Extension and iphone Interface 6 weeks, 3 phases, 2 products, 1 client, design, implement - Presentation Date: Thursday June 18 - Authors: Mark Barkmeier

More information

Cyberspace Security Use Keystroke Dynamics. Alaa Darabseh, B.S. and M.S. A Doctoral Dissertation In Computer Science

Cyberspace Security Use Keystroke Dynamics. Alaa Darabseh, B.S. and M.S. A Doctoral Dissertation In Computer Science Cyberspace Security Use Keystroke Dynamics by Alaa Darabseh, B.S. and M.S. A Doctoral Dissertation In Computer Science Submitted to the Graduate Faculty of Texas Tech University in Partial Fulfillment

More information

The Study on Mobile Phone-oriented Application Integration Technology of Web Services 1

The Study on Mobile Phone-oriented Application Integration Technology of Web Services 1 The Study on Mobile Phone-oriented Application Integration Technology of Web Services 1 Li Luqun 1, 2 Li Minglu 1 Cui Xianguo 2 1. Department of Computer Science of Shanghai Jiaotong University, 1954 Huashan

More information

Real Time Dynamic Mobile Scheduling System. Thesis proposal. For the degree of Master of Science in Computer Science

Real Time Dynamic Mobile Scheduling System. Thesis proposal. For the degree of Master of Science in Computer Science Real Time Dynamic Mobile Scheduling System Page 1 Real Time Dynamic Mobile Scheduling System Thesis proposal For the degree of Master of Science in Computer Science At Southern Connecticut State University

More information

CSC 474 -- Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity

CSC 474 -- Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity CSC 474 -- Network Security Topic 6.2 User Authentication CSC 474 Dr. Peng Ning 1 User Authentication Basics CSC 474 Dr. Peng Ning 2 Authentication and Identity What is identity? which characteristics

More information

Multi Factor Authentication API

Multi Factor Authentication API GEORGIA INSTITUTE OF TECHNOLOGY Multi Factor Authentication API Yusuf Nadir Saghar Amay Singhal CONTENTS Abstract... 3 Motivation... 3 Overall Design:... 4 MFA Architecture... 5 Authentication Workflow...

More information

Introduction to ANSYS

Introduction to ANSYS Lecture 3 Introduction to ANSYS Meshing 14. 5 Release Introduction to ANSYS Meshing 2012 ANSYS, Inc. March 27, 2014 1 Release 14.5 Introduction to ANSYS Meshing What you will learn from this presentation

More information

Mobile application development J2ME U N I T I I

Mobile application development J2ME U N I T I I Mobile application development J2ME U N I T I I Overview J2Me Layered Architecture Small Computing Device requirements Run Time Environment Java Application Descriptor File Java Archive File MIDlet Programming

More information

24-Hour Road Service Mobile Apps

24-Hour Road Service Mobile Apps 24-Hour Road Service Mobile Apps Project Plan Fall 2011 Michigan State University Computer Science and Engineering Capstone Team Members: Paul Fritschen Justin Hammack Lingyong Wang Contents 1. Auto-Owners

More information

Dynamic Bluetooth File Sharing With Cellular Devices. Project Goals

Dynamic Bluetooth File Sharing With Cellular Devices. Project Goals Dynamic Bluetooth File Sharing With Cellular Devices Steve Brar George Chen Michael Hair Jon Wagoner Project Goals Establishing a Bluetooth connection Download application software to client Look up existing

More information

Building Motion and Noise Detector Networks from Mobile Phones

Building Motion and Noise Detector Networks from Mobile Phones Building Motion and Noise Detector Networks from Mobile Phones Péter Ekler 1111 Budapest, Magyar Tudósok körútja 2. IL208, peter.ekler@aut.bme.hu Hassan Charaf Dr. 1111 Budapest, Magyar Tudósok körútja

More information

LOCATIONS AROUND ME (ANDROID)

LOCATIONS AROUND ME (ANDROID) IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 4, Apr 2014, 193-198 Impact Journals LOCATIONS AROUND ME (ANDROID)

More information

Keywords image processing, signature verification, false acceptance rate, false rejection rate, forgeries, feature vectors, support vector machines.

Keywords image processing, signature verification, false acceptance rate, false rejection rate, forgeries, feature vectors, support vector machines. International Journal of Computer Application and Engineering Technology Volume 3-Issue2, Apr 2014.Pp. 188-192 www.ijcaet.net OFFLINE SIGNATURE VERIFICATION SYSTEM -A REVIEW Pooja Department of Computer

More information

SUMMARY. e-soft s.r.l.

SUMMARY. e-soft s.r.l. Pag. 1 di 10 SUMMARY FIRST STEPS ON VT-BAG... 2 LOGIN... 2 SERVER SYNCHRONIZATION... 4 VT-BAG FEATURES... 5 MODULES ORGANIZATION... 5 FIELDS TO DISPLAY IN ENTITY LIST... 6 ENTITY DETAIL... 7 NAVIGATION

More information

Introduction Installation firewall analyzer step by step installation Startup Syslog and SNMP setup on firewall side firewall analyzer startup

Introduction Installation firewall analyzer step by step installation Startup Syslog and SNMP setup on firewall side firewall analyzer startup Introduction Installation firewall analyzer step by step installation Startup Syslog and SNMP setup on firewall side firewall analyzer startup Configuration Syslog server add and check Configure SNMP on

More information

M&T Web InfoPLU$ GETTING STARTED GUIDE

M&T Web InfoPLU$ GETTING STARTED GUIDE M&T Web InfoPLU$ GETTING STARTED GUIDE Web InfoPLU$ Getting Started Guide Welcome to Web InfoPLU$, M&T s Internet reporting and payment service. The purpose of this guide is to help you log on for the

More information

Multi-factor authentication

Multi-factor authentication CYBER SECURITY OPERATIONS CENTRE (UPDATED) 201 (U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL

More information

1. Introduction 1.1 Methodology

1. Introduction 1.1 Methodology Table of Contents 1. Introduction 1.1 Methodology 3 1.2 Purpose 4 1.3 Scope 4 1.4 Definitions, Acronyms and Abbreviations 5 1.5 Tools Used 6 1.6 References 7 1.7 Technologies to be used 7 1.8 Overview

More information

Central Desktop Enterprise Edition (Security Pack)

Central Desktop Enterprise Edition (Security Pack) Central Desktop Enterprise Edition (Security Pack) The Central Desktop Security Pack is included in the Enterprise Edition of Central Desktop. The Enterprise Edition is for companies and organizations

More information

Biometric Authentication using Online Signatures

Biometric Authentication using Online Signatures Biometric Authentication using Online Signatures Alisher Kholmatov and Berrin Yanikoglu alisher@su.sabanciuniv.edu, berrin@sabanciuniv.edu http://fens.sabanciuniv.edu Sabanci University, Tuzla, Istanbul,

More information

Situation: Proving Quadrilaterals in the Coordinate Plane

Situation: Proving Quadrilaterals in the Coordinate Plane Situation: Proving Quadrilaterals in the Coordinate Plane 1 Prepared at the University of Georgia EMAT 6500 Date Last Revised: 07/31/013 Michael Ferra Prompt A teacher in a high school Coordinate Algebra

More information

Version 3.2 Release Note. V3.2 Release Note

Version 3.2 Release Note. V3.2 Release Note Version 3.2 Release Note V3.2 Release Note Welcome to v3.2 of RM Unify We are pleased to detail the release of RM Unify v3.2. This release brings with it Chromebook single sign-on, allowing users with

More information

Summer Project Report. Fingerprint Based Attendance System

Summer Project Report. Fingerprint Based Attendance System Summer Project Report On Fingerprint Based Attendance System Advisor Prof Amey Karkare Submitted by- Rajat Chaudhary Priyaranjan Deepak Kumar Durgesh Deep (Group 02) Introduction The most common means

More information

Quectel Cellular Engine

Quectel Cellular Engine Cellular Engine GSM FTP AT Commands GSM_FTP_ATC_V1.1 Document Title GSM FTP AT Commands Version 1.1 Date 2010-12-28 Status Document Control ID Release GSM_FTP_ATC_V1.1 General Notes offers this information

More information

Using mobile phones to access Web Services in a secure way. Dan Marinescu

Using mobile phones to access Web Services in a secure way. Dan Marinescu Using mobile phones to access Web Services in a secure way Dan Marinescu March 7, 2007 Abstract Web Services is a technology that has gained in acceptance and popularity over the past years. The promise

More information

ADDING and/or DELETING PIN NUMBERS (Plus other simple programming commands) in My DK-16 or DK-26 DIGITAL KEYPAD

ADDING and/or DELETING PIN NUMBERS (Plus other simple programming commands) in My DK-16 or DK-26 DIGITAL KEYPAD ADDING and/or DELETING PIN NUMBERS (Plus other simple programming commands) in My DK-16 or DK-26 DIGITAL KEYPAD A recurring call that we get here at Securitron Technical Support is from end users of our

More information

Monitoring HP OO 10. Overview. Available Tools. HP OO Community Guides

Monitoring HP OO 10. Overview. Available Tools. HP OO Community Guides HP OO Community Guides Monitoring HP OO 10 This document describes the specifications of components we want to monitor, and the means to monitor them, in order to achieve effective monitoring of HP Operations

More information

Fachbereich Informatik und Elektrotechnik SunSPOT. Ubiquitous Computing. Ubiquitous Computing, Helmut Dispert

Fachbereich Informatik und Elektrotechnik SunSPOT. Ubiquitous Computing. Ubiquitous Computing, Helmut Dispert Ubiquitous Computing Ubiquitous Computing The Sensor Network System Sun SPOT: The Sun Small Programmable Object Technology Technology-Based Wireless Sensor Networks a Java Platform for Developing Applications

More information

SYSTEM OF MONITORING AND CONTROL FOR THE AUTOMATION OF INDUSTRIAL WASH MACHINES

SYSTEM OF MONITORING AND CONTROL FOR THE AUTOMATION OF INDUSTRIAL WASH MACHINES SYSTEM OF MONITORING AND CONTROL FOR THE AUTOMATION OF INDUSTRIAL WASH MACHINES Catalin BUJDEI Liviu PERNIU Ion TRUICAN Mihai CARAMAN Automatics Department, Transilvania University of Brasov, M.Viteazu

More information

PDA DRIVEN WAREHOUSE INVENTORY MANAGEMENT SYSTEM Sebastian Albert Master of Science in Technology sebastianpremraj@yahoo.com

PDA DRIVEN WAREHOUSE INVENTORY MANAGEMENT SYSTEM Sebastian Albert Master of Science in Technology sebastianpremraj@yahoo.com PDA DRIVEN WAREHOUSE INVENTORY MANAGEMENT SYSTEM Sebastian Albert Master of Science in Technology sebastianpremraj@yahoo.com Abstract In times of economic slow-down, cutting costs is the major strategy

More information

Lyman Memorial High School. Pre-Calculus Prerequisite Packet. Name:

Lyman Memorial High School. Pre-Calculus Prerequisite Packet. Name: Lyman Memorial High School Pre-Calculus Prerequisite Packet Name: Dear Pre-Calculus Students, Within this packet you will find mathematical concepts and skills covered in Algebra I, II and Geometry. These

More information

Cello+ Operating radio network analyzer system. Radio engineering operation support system QIS 2014

Cello+ Operating radio network analyzer system. Radio engineering operation support system QIS 2014 Cello+ Operating radio network analyzer system 1 Radio engineering operation support system About Us Q.I.S specializes in design and development of creative and innovative computerized information and

More information

KEANSBURG SCHOOL DISTRICT KEANSBURG HIGH SCHOOL Mathematics Department. HSPA 10 Curriculum. September 2007

KEANSBURG SCHOOL DISTRICT KEANSBURG HIGH SCHOOL Mathematics Department. HSPA 10 Curriculum. September 2007 KEANSBURG HIGH SCHOOL Mathematics Department HSPA 10 Curriculum September 2007 Written by: Karen Egan Mathematics Supervisor: Ann Gagliardi 7 days Sample and Display Data (Chapter 1 pp. 4-47) Surveys and

More information

EFFECTIVE QUERY RETRIEVAL SYSTEM IN MOBILE BUSINESS ENVIRONMENT

EFFECTIVE QUERY RETRIEVAL SYSTEM IN MOBILE BUSINESS ENVIRONMENT EFFECTIVE QUERY RETRIEVAL SYSTEM IN MOBILE BUSINESS ENVIRONMENT 1 R.Sivaraman, 2 RM.Chandrasekaran 1 Dy.Director, Center for Convergence of Technologies (CCT), Anna University Tiruchirappalli, Tiruchirappalli,

More information

A Service Revenue-oriented Task Scheduling Model of Cloud Computing

A Service Revenue-oriented Task Scheduling Model of Cloud Computing Journal of Information & Computational Science 10:10 (2013) 3153 3161 July 1, 2013 Available at http://www.joics.com A Service Revenue-oriented Task Scheduling Model of Cloud Computing Jianguang Deng a,b,,

More information

May 2010. For other information please contact:

May 2010. For other information please contact: access control biometrics user guide May 2010 For other information please contact: British Security Industry Association t: 0845 389 3889 f: 0845 389 0761 e: info@bsia.co.uk www.bsia.co.uk Form No. 181.

More information

Intermedia Cloud Softphone. User Guide

Intermedia Cloud Softphone. User Guide Intermedia Cloud Softphone User Guide FOR MORE INFO VISIT: CALL US EMAIL US intermedia.net +1.800.379.7729 sales@intermedia.net 1 Contents 1 Introduction... 3 1.1 Cloud Softphone Features... 3 2 Installation...

More information

If you wanted multiple screens, there was no way for data to be accumulated or stored

If you wanted multiple screens, there was no way for data to be accumulated or stored Handling State in Web Applications Jeff Offutt http://www.cs.gmu.edu/~offutt/ SWE 642 Software Engineering for the World Wide Web sources: Professional Java Server Programming, Patzer, Wrox Web Technologies:

More information

Measuring Performance in a Biometrics Based Multi-Factor Authentication Dialog. A Nuance Education Paper

Measuring Performance in a Biometrics Based Multi-Factor Authentication Dialog. A Nuance Education Paper Measuring Performance in a Biometrics Based Multi-Factor Authentication Dialog A Nuance Education Paper 2009 Definition of Multi-Factor Authentication Dialog Many automated authentication applications

More information

MATH 2 Course Syllabus Spring Semester 2007 Instructor: Brian Rodas

MATH 2 Course Syllabus Spring Semester 2007 Instructor: Brian Rodas MATH 2 Course Syllabus Spring Semester 2007 Instructor: Brian Rodas Class Room and Time: MC83 MTWTh 2:15pm-3:20pm Office Room: MC38 Office Phone: (310)434-8673 E-mail: rodas brian@smc.edu Office Hours:

More information

Deltek Touch Time & Expense for GovCon. User Guide for Triumph

Deltek Touch Time & Expense for GovCon. User Guide for Triumph Deltek Touch Time & Expense for GovCon User Guide for Triumph November 25, 2014 While Deltek has attempted to verify that the information in this document is accurate and complete, some typographical or

More information

How To Check For Differences In The One Way Anova

How To Check For Differences In The One Way Anova MINITAB ASSISTANT WHITE PAPER This paper explains the research conducted by Minitab statisticians to develop the methods and data checks used in the Assistant in Minitab 17 Statistical Software. One-Way

More information

SAIT TDC ORIENTATION PACKAGE

SAIT TDC ORIENTATION PACKAGE SAIT TDC ORIENTATION PACKAGE System Requirements ----------------------------------------------------------------------------------------------------------- 2 Getting Started --------------------------------------------------------------------------------------------------------------------

More information

A FRAMEWORK FOR A MOBILE VIRTUAL TERMINAL

A FRAMEWORK FOR A MOBILE VIRTUAL TERMINAL ANNALS OF THE FACULTY OF ENGINEERING HUNEDOARA 2006, Tome IV, Fascicole 1, (ISSN 1584 2665) FACULTY OF ENGINEERING HUNEDOARA, 5, REVOLUTIEI, 331128, HUNEDOARA A FRAMEWORK FOR A MOBILE VIRTUAL TERMINAL

More information

Project Proposal. Data Storage / Retrieval with Access Control, Security and Pre-Fetching

Project Proposal. Data Storage / Retrieval with Access Control, Security and Pre-Fetching 1 Project Proposal Data Storage / Retrieval with Access Control, Security and Pre- Presented By: Shashank Newadkar Aditya Dev Sarvesh Sharma Advisor: Prof. Ming-Hwa Wang COEN 241 - Cloud Computing Page

More information

Decision Trees for Mining Data Streams Based on the Gaussian Approximation

Decision Trees for Mining Data Streams Based on the Gaussian Approximation International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-3 E-ISSN: 2347-2693 Decision Trees for Mining Data Streams Based on the Gaussian Approximation S.Babu

More information

International Journal of Computing and Business Research (IJCBR) INSECURE GSM NETWORK AND SECURITY SOLUTIONS FOR MOBILE BANKING

International Journal of Computing and Business Research (IJCBR) INSECURE GSM NETWORK AND SECURITY SOLUTIONS FOR MOBILE BANKING INSECURE GSM NETWORK AND SECURITY SOLUTIONS FOR MOBILE BANKING Karun Madan, Surya World Institute of Engg. & Technology, Rajpura, Punjab ABSTRACT Out of the many revolutions in the current world, mobile

More information

Wireless Web Content Management Using J2ME

Wireless Web Content Management Using J2ME Wireless Web Content Management Using J2ME Anjana Gangadhar 1, K Shirin Bhanu 2 1 M.Tech, CS, Sri Vasavi Engineering College, Pedhatadepalli, Tadepalligudem W.G.Dt., A.P. India. 2 Sr.Assistant Professor,

More information

PCHS ALGEBRA PLACEMENT TEST

PCHS ALGEBRA PLACEMENT TEST MATHEMATICS Students must pass all math courses with a C or better to advance to the next math level. Only classes passed with a C or better will count towards meeting college entrance requirements. If

More information

Welcome to the second half ofour orientation on Spotfire Administration.

Welcome to the second half ofour orientation on Spotfire Administration. Welcome to the second half ofour orientation on Spotfire Administration. In this presentation, I ll give a quick overview of the products that can be used to enhance a Spotfire environment: TIBCO Metrics,

More information

emedyx Emergeny Smart Card EMR System: Card Holder Module

emedyx Emergeny Smart Card EMR System: Card Holder Module CMSC 190 SPECIAL PROBLEM, INSTITUTE OF COMPUTER SCIENCE 1 emedyx Emergeny Smart Card EMR System: Card Holder Module Elizabeth D. Ruetas and Joseph Anthony C. Hermocilla Abstract The emedyx system is an

More information

An Analysis of Keystroke Dynamics Use in User Authentication

An Analysis of Keystroke Dynamics Use in User Authentication An Analysis of Keystroke Dynamics Use in User Authentication Sam Hyland (0053677) Last Revised: April 7, 2004 Prepared For: Software Engineering 4C03 Introduction Authentication is an important factor

More information

Biometrics for Global Web Authentication: an Open Source Java/J2EE-Based Approach

Biometrics for Global Web Authentication: an Open Source Java/J2EE-Based Approach Biometrics for Global Web Authentication: an Open Source Java/J2EE-Based Approach Ruchir Choudhry ruchirchoudhry@cint.co.in; Abstract. J2EE based Web applications have largely spread over our multiple

More information

GRAVITYZONE HERE. Deployment Guide VLE Environment

GRAVITYZONE HERE. Deployment Guide VLE Environment GRAVITYZONE HERE Deployment Guide VLE Environment LEGAL NOTICE All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including

More information

City of Dublin Education & Training Board. Programme Module for. Mobile Technologies. leading to. Level 6 FETAC. Mobile Technologies 6N0734

City of Dublin Education & Training Board. Programme Module for. Mobile Technologies. leading to. Level 6 FETAC. Mobile Technologies 6N0734 City of Dublin Education & Training Board Programme Module for Mobile Technologies leading to Level 6 FETAC Version 3 1 Introduction This programme module may be delivered as a standalone module leading

More information

A FRAMEWORK FOR MANAGING RUNTIME ENVIRONMENT OF JAVA APPLICATIONS

A FRAMEWORK FOR MANAGING RUNTIME ENVIRONMENT OF JAVA APPLICATIONS A FRAMEWORK FOR MANAGING RUNTIME ENVIRONMENT OF JAVA APPLICATIONS Abstract T.VENGATTARAMAN * Department of Computer Science, Pondicherry University, Puducherry, India. A.RAMALINGAM Department of MCA, Sri

More information

Authentication Method through Keystrokes Measurement of Mobile users in Cloud Environment

Authentication Method through Keystrokes Measurement of Mobile users in Cloud Environment Int. J. Advance Soft Compu. Appl, Vol. 6, No. 3, November 2014 ISSN 2074-8523 Authentication Method through Keystrokes Measurement of Mobile users in Cloud Environment Mahnoush Babaeizadeh, Majid Bakhtiari,

More information

Mechanics Bank Mobile Banking Mobile Finance Manager (MFM) Application Windows Mobile Phone Installation

Mechanics Bank Mobile Banking Mobile Finance Manager (MFM) Application Windows Mobile Phone Installation Mechanics Bank Mobile Banking Mobile Finance Manager (MFM) Application Windows Mobile Phone Installation Thank you for your interest in Mechanics Bank Mobile Banking. This guide will help you get started

More information

A Behavioral Biometric Approach Based on Standardized Resolution in Mouse Dynamics

A Behavioral Biometric Approach Based on Standardized Resolution in Mouse Dynamics 370 IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.4, April 2009 A Behavioral Biometric Approach Based on Standardized Resolution in Mouse Dynamics S.Benson Edwin Raj Assistant

More information

How To Get A Computer Engineering Degree

How To Get A Computer Engineering Degree COMPUTER ENGINEERING GRADUTE PROGRAM FOR MASTER S DEGREE (With Thesis) PREPARATORY PROGRAM* COME 27 Advanced Object Oriented Programming 5 COME 21 Data Structures and Algorithms COME 22 COME 1 COME 1 COME

More information

The program also provides supplemental modules on topics in geometry and probability and statistics.

The program also provides supplemental modules on topics in geometry and probability and statistics. Algebra 1 Course Overview Students develop algebraic fluency by learning the skills needed to solve equations and perform important manipulations with numbers, variables, equations, and inequalities. Students

More information

Logo Symmetry Learning Task. Unit 5

Logo Symmetry Learning Task. Unit 5 Logo Symmetry Learning Task Unit 5 Course Mathematics I: Algebra, Geometry, Statistics Overview The Logo Symmetry Learning Task explores graph symmetry and odd and even functions. Students are asked to

More information

HP WebInspect Tutorial

HP WebInspect Tutorial HP WebInspect Tutorial Introduction: With the exponential increase in internet usage, companies around the world are now obsessed about having a web application of their own which would provide all the

More information

Write. Once. Deploy. Anywhere. Anatole Wilson. Writing Applications for mobile devices and reducing device fragmentation with NetBeans Mobility Pack

Write. Once. Deploy. Anywhere. Anatole Wilson. Writing Applications for mobile devices and reducing device fragmentation with NetBeans Mobility Pack Write Once Deploy nywhere Writing pplications for mobile devices and reducing device fragmentation with NetBeans Mobility Pack natole Wilson Write Once, Deploy nywhere Take a look around you in just about

More information

White Paper PalmSecure truedentity

White Paper PalmSecure truedentity White Paper PalmSecure truedentity Fujitsu PalmSecure truedentity is used for mutual service and user authentication. The user's identity always remains in the possession of the user. A truedentity server

More information

Java ME & NetBeans Mobility. Petr Suchomel Architect, NetBeans Mobility Sun Microsystems

Java ME & NetBeans Mobility. Petr Suchomel Architect, NetBeans Mobility Sun Microsystems Java ME & NetBeans Mobility Petr Suchomel Architect, NetBeans Mobility Sun Microsystems Agenda Java ME introduction Java ME applications NetBeans Mobility Edition Power of advanced features Demos, demos,

More information