Mobile Biometric Security Systems for Today and Future
|
|
|
- Alyson Shields
- 9 years ago
- Views:
Transcription
1 2 nd International Symposium on Digital Forensics and Security (ISDFS 14), May 2014, Houston, TX Mobile Biometric Security Systems for Today and Future N. Yıldırım 1 and A.Varol 2 1 Fırat University, Elazig/Turkey, [email protected] 2 Fırat University, Elazig/Turkey, [email protected] Abstract Mobile devices are providing facility to human life in many areas such as online shopping, mobile banking and online messaging etc. therefore it has become an essential part of daily life. This scenario has directed people and institutions to seek more new ways regarding the security of mobile because all of the major transactions get done on mobile devices. Passwords (one-time passwords, complex character passwords, etc.) and login screen drawings of devices cannot ensure the safety of mobile devices, their applications and users therefore the hacking is becoming common. Biometric identification which is specific and distinguishing feature it is considered more secure than passwords because it is difficult to copy and alter. Biometric security systems are new as application for mobile systems and they need advancement and development in hardware and application fields. In this paper, we will discuss existing biometric systems for mobile device, operating systems and applications developed for biometrics security. for mobile, future of biometrics in mobile and applications in terms of human-computer interaction (HCI) are discussed. II. BIOMETRIC SECURITY SYSTEMS Biometric technologies are described as automated authentication and verifying the identity of a living person based on the physiological and behavioral characteristic [1]. In all of biometric systems, the samples (fingerprint, voice, retina, etc.) taken from people are stored in a storage device after translated into a numerical expression and encryption, afterwards, when users want to log in to the system again, compatibility of records is checked via matching previously existing reference points with the stored reference point [2]. Keywords Mobile, Security, Biometric Systems, Mobile Biometric Security. HCI M I. INTRODUCTION OBILE devices have become a part of human life with the privilege of portability and the daily life is not complete without these devices. Hardware manufacturers, operating system and application developers take a variety of security measures due to personal, private and sensitive information in mobile devices. To ensure the security passwords, PINs or patterns are used to unlock the screen. Processing with password, unlocking mobile phone screens with PIN or pattern drawing, entering the card information for payment every time it is both time-consuming and challenging for users. However, the distinguishing human biometric features can be used as distinctive instead of all these passwords. This can offer a more secure and practical solution for the user. It is under consideration nowadays to use biometric as solution for security protection of mobile devices. Face, fingerprint, palm, vein, voice and signature recognition features are often used as biometric identification. New generation smart phones and mobile operating systems allows developers to create biometric recognition and security applications using the camera, sound and touching features. Recently, mobile devices with biometric fingerprint sensor have given a different dimension to biometric identifications. In this paper, biometric security, the importance of biometric security for mobile devices, developed biometric applications Figure 1: Operating mode of biometric security systems [3]. Biometric recognition systems can be listed as iris, retina, face, fingerprint, vein, palm for physiological biometrics and voice, signature, keystroke for behavioral biometrics. Physiological biometrics is based on the measurements of a part of the living human body and behavioural biometrics means measurements that are provided from an action implemented by the user [3]. In a survey of 188 people about the use of biometrics, it is measured that 71.8 percent of users use fingerprint recognition it is a big majority and 6 percent of users use hand geometry and signature recognition while face recognition is measured as only 1 percent [4]. So it is clear that the most applied biometric method is fingerprint. A fingerprint consists of the ridges on a person s finger and a fingerprint distinguishes from others by the unique pattern of those ridges [5]. Face recognition is the simplest and natural way to identify biometric authentication of living human and also face recognition has three types; single image, multiple image and frame by frame video [3]. According to Javelin Strategy & Research [6], 35 percent of consumers use fingerprint matching method as biometric as seen in Figure 2. 86
2 N. Yıldırım and A. Varol I am not interested in Another biometric method Keystroke analysis Hand geometry Voice recognition Face recognition Eye scan Fingerprint matching Percent Figure 2: Biometric usage by consumers [6]. While collecting data with biometric devices, data accuracy, and detecting that the data which is gathered from living user are important [7]. Liveness detection is important for biometric systems because spoof biometric data can be gathered from a living user and can be used in illegal operations [7]. Nowadays, motion pictures, determination of a person's vein structure and use with fingerprint or palm recognition (with infrared rays), heartbeat and telling desired sentence with person's own voice are used for liveness detection due to biometric identification copying such as fingerprint, face is also possible. Two methods are applied together is defined as bi-modal authentication as described. Bi-modal authentication is important to identify the real person. Using only one way authentication is less secure than bi-modal authentication due to the risk of copying and capturing biometric information. III. MOBILE BIOMETRIC SECURITY SYSTEMS Considering the security measures on mobile devices, followed security measures emerge; SIM card security with the PIN code Drawing shapes on the screen or pin number input for security of access to smart mobile phones. E - mail and password authentication for accessing some applications. Various applications for ensuring the safety and validity of mobile phones. All of these security measures are not sufficient for the case of stolen or illegally access. It is likely to be stolen PIN number of mobile SIM card and screen pattern password or screen PIN number by shoulder surfers or to be seized s and passwords by malicious people. When the credit card is saved to Google Play Store or Apple App Store, a person who knows the phone password can shop from markets. Considering all this negativity, biometric features of user have been starting to use to protect the mobile device and therefore user. In Karnan and Krishnaraj s study [1], durations, times, typing errors and force of keystrokes have been used as behavioral biometric characteristic for accessing to mobile devices. But it is understood that to evaluate the keystrokes as biometric characteristic and compare results too hard. In Tsai et al. s study [8], they have proposed the use of biometric identification with one-time password (OTP) for mobile banking transactions. With the increase of the techniques for seizing one-time passwords, this has been a threat to mobile users. In the proposed system, it is recommended for banks to store the user's fingerprint, iris and face captured records to avoid this situation and to improve the security of mobile banking. When the user enters the correct OTP, biometric verification is required via real-time biometric capture from user. Thus the user will be able to enter the mobile banking system [8]. In the study [9] about mobile payment system via fingerprint, at first, user enters credit card and fingerprint templates and templates are saved. After obtaining a public key with an SSL connection, hash template of the fingerprint are created. The verification process is done after fingerprint hash and credit card information are sent to the server by public key. In Omri et al. s paper [10], a handwriting authentication system has been proposed and covered. User's handwriting templates are saved to the database. The biometric recognition system runs on a server which is on the cloud virtual machine. The password that is entered by handwriting to mobile device with touch screen is compared with the password which is in the database and provided to enter to system. A. Biometric Security Applications for Smart Mobile Devices Mobile Smart Phones enable the user to develop applications by using some telephone features as camera, microphone, and stylus (in some smart mobile devices like ipad and Galaxy Note). By the advantages of these features, users develop applications about biometric security systems for mobile devices. Face, fingerprint and iris recognition applications being developed using the camera of mobile device also the applications have been developed for voice recognition using a microphone and signature recognition using a stylus. In addition to all of these hardware features, Google has developed face unlocks for 4.0 (Ice Cream Sandwich) [11]. Camera.Face class on helps developer to identify a face. When face detection is used with a camera, the Camera.FaceDetectionListener lists the face objects (left eye, right eye, mouth, and cheekbone) to use in focusing and measurement [12]. As well as, ios has brought AVCaptureStillImageOutput class with SquareCam [13] for camera settings and has created CIFaceFeature class for face recognition. The following features are defined by the facial recognition objects of ios; left eye, right eye, mouth, smiling, left and right eye closed positions [14]. and ios systems also include speech recognizer classes as well as face recognition classes. Some of known applications about biometric recognition and biometric security systems and its area of use have been described in Table 1. 87
3 Mobile Biometric Security Systems for Today and Future Application Name and Platform FastAccess [15] Visidon AppLock [16] Mobbeel [17] and ios RecognizeMe [18] ios FaceLock [18] ios FaceVault [18] ios Signedoc [19] and ios XyzmoSIGNificant [20] and ios Start Voice [21] BioLock v1.0 [22] SESTEK Voice Signature (Vocal passphrase) [23] HoyosID [24] and ios Table 1. Biometric applications and their functions. Biometrics Face Face Face,Iris, Voice, Signature Facial Detection Facial Detection Facial Detection Signature Signature Voice Face and Iris and PIN Combined Voice Face How it works It is used for accessing devices, applications, GooglePlay etc. by facial recognition. It protects any application (i.e. SMS, Gallery, , Facebook, etc.) on the user s phone using face recognition This API uses these biometric for recognitions. Signature recognition needs ipads and it comes with digital certificate. User can use multi biometrics for security. It locks iphone using face detection with front camera It scans user's face and user accesses the iphone and it only detects the real user's face. It uses facial and if it fails, it passes to pattern-based unlocking. It detects user s face even if wearing glasses or make up. With this API user signs documents with legal validity on mobile or tablet. It recognizes user s signature This app processes signing documents, mailing of paper originals, and long-term storage of documents. User can sign documents electronically with a tablet or smartphone. This application uses voice recognition system on and is used for to lock the screen of user's phone. It is only used on devices which support the Quick Start. It uses two forms of biometrics (face or iris) with a PIN and creates a encrypted key and it is used to lock or open the phone or user data. It is a biometric voice recognition application which verifies the identity of the person who calls. This application performs face recognition with the front camera of the mobile device and all accounts, user names and passwords are required to save in this application. When the application recognizes the face, it enters the passwords instead of the user. In addition, the passwords are stored in telephone, not on the internet. Besides these applications, mobile smart phone manufacturers create face recognition applications for user to open unlocked phone screen as well as Samsung Galaxy Nexus [25]. B. Biometric Security Solutions as Hardware for Smart Mobile Devices in Today The use of biometric recognition on mobile devices has started with cameras and microphones as hardware features and the operating systems which allow using them with programming. According to Gartner's report, 30 percent of organizations will use biometric authentication on mobile devices by 2016 and this usage may be facial, voice, iris recognition and user password [26]. Goode Intelligence predicts that 3.4 billion users will use biometric systems on their mobile devices by 2018 and mobile device producers will earn 8.3 billion dollars [27]. Mobile device manufacturers have started to carry different biometric sensors on mobile devices due to practical and safer methods of biometric authentication for users. Now fingerprint sensors are able on the latest smart mobile devices. Apple's Touch ID creates a strong biometric platform on consumer mobile devices by 2018 and fingerprint sensors will be standard on mobile devices until 2015 [27]. In Goode's mobile biometric market report , the factors in realization of mobile biometric market growth are discussed in the following [27]: Biometrics is presented to end-users and consumers like Apple iphone 5s and Touch ID technology. Biometrics that can be used easily brings practical mobile device protection due to mobile device authentication methods (PIN or password) are cumbersome and unpractical. The use of biometric authentication system for mobile commerce is a convenient and safe way for payment methods. Many authentication companies as FIDO Alliance are making plans to support biometrics and this support will also be provided on mobile devices. Fingerprint templates are kept in a secure area called secure vault" by Apple s Touch ID fingerprint solution and all the security measures makes mobile devices safer for biometrics.. 88
4 N. Yıldırım and A. Varol a. iphone 5s as ios Device and Touch ID Touch ID for iphone was developed as a fingerprint identification technology. Fingerprint sensor is located under the main screen button as seen in Figure 3. Figure 3: iphone fingerprint sensor [28]. When touching (without pressing) the home button of iphone 5s, Touch ID sensor reads fingerprints and unlocks the phone's lock automatically [28]. One of the features in this system, as users use fingerprint sensor, the system learns the types of the fingerprint. The system allows five fingers identification and 50,000 different fingers should be tested for random matching of fingerprints [29]. Also Touch ID has reading fingerprint in 360 degrees feature, which means the system can read fingerprints in any direction of phone. Also fingerprint data is encrypted and protected with the safe containment within the A7 chip and none of applications can access fingerprint information [29]. Touch ID is used for; Shopping from Tunes Store, App Store and ibooks Store, Unlocking iphone. ios does not allow to use Touch ID features for developers in terms of security. This hampers developing applications using fingerprint sensor. b. HTC One Max and Samsung Galaxy S5 as Device HTC One Max is the first mobile device which includes fingerprint sensor. Fingerprint scanner is located below the camera lens at the back of the phone. The system allows identification of three fingers and fingerprint identification is used for unlocking phone (Figure 4) [30]. It also has A7 chip security as iphone. Fingerprint sensor that is integrated into Galaxy S5 home button is used for unlock device and pay. Samsung Galaxy S5 differs from other fingerprint features because it allows third party application developers to create applications using fingerprint sensor API (Pass API) [31]. It is associated with PayPall and Samsung Galaxy S5 users can shop via Paypall using fingerprint biometric. C. HCI for Biometric Systems on Smart Mobile Devices Human Computer Interaction can be explained as interaction between users of computer and technology and computer hardware and software. Human Computer Interaction (HCI) has become more important in human lives because technology and technological devices have become a part of human life. Blanco-Gonzalo et al. [32] have investigated the usability evaluation of biometrics in mobile devices. Handwriting signature recognition is used for usability evaluation. IPad is used as a mobile device. The effects of usability of biometric signature with different styluses were measured with different parameters. The results have been different with each stylus [32]. This illustrates the importance of mobile device usability of biometric recognition. It can be interpreted that the errors arise from usability can cause not confirmed entries in the biometric recognition process. When biometric technologies on mobile devices are analyzed by usability branch of HCI, some points are discovered that may prevent safety and practicality for users. Using the rear camera for face recognition on mobile devices affect the usability. Because the user cannot take his/her picture accurately from back camera. When using the styluses for signature recognition, signature pairings may not be accurate [32] due to the type of styluses or touch screen. Appropriate hardware affects usability. The location of the fingerprint sensor on a mobile device is very important for usability. While HTC places the fingerprint sensor below the rear camera, Samsung and iphone have positioned it under home screen button. Be present of the sensor on the display side of the mobile phone can positively affect usability. When iphone reads fingerprint from 360 degrees by touching, Samsung and HTC needs to scroll up and down of the finger in one direction. This may not be very practical and may not be easy to find the correct position of the finger for the user. Biometric identification applications should not exhibit an inverse approach to the user's habits. Speed and simplicity of applications affect the usability. Figure 4: Fingerprint recognition of HTC One Max [30]. 89
5 Mobile Biometric Security Systems for Today and Future IV. CONCLUSION Today with technology advent, information security has become more important. It is seen that passwords or PINs are insufficient for ensuring and protecting the security of information. The importance of mobile device technologies in human life and all kinds of personal information carried on these devices was also necessary to take different security measures. Unique biometric features of human are used as the password with existing technology. Image, voice and signature of the person have been used as biometrics with the help of camera, microphone and touchscreen features of the mobile device. Phone protection, application access, e-signature transactions are provided via these characteristics. Mobile device manufacturers install the fingerprint sensor in the devices for identification of fingerprint which is frequently used biometrics. In this way user security is protected and operations which require password can be performed only by one touch. In addition, usability of biometric recognition systems for HCl will increase use of mobile biometric systems by everyday users. It is concluded that with the popularization of mobile devices which include fingerprint sensor, mobile biometric recognition will be used in the following ways: Biometric recognition, especially fingerprint, for mobile payment transactions will bring mobile payments in a safer and easier position. Using the fingerprint as the screen lock of device will be easier and safer for users. Mobile banking will provide fingerprint along with onetime-password and mobile applications will be updated in this way. Through allowing developers of using fingerprint sensor for creating applications, different ideas will be born for mobile biometrics and a new page will be opened in mobile security. REFERENCES [1] M. Karnan and N. Krishnaraj, «Bio Password - Keystroke dynamic Approach to Secure Mobile Devices,» inside Computational Intelligence and Computing Research (ICCIC), 2010 IEEE International Conference on, Coimbatore, [2] A. Varol and B. Cebe, «Yüz Tanıma Algoritmaları,» inside 5th International Computer & Instructional Technologies Symposium (ICITS'11), Elazig/Turkey, [3] M. Faundez-Zanuy, «Biometric Security Technology,» Aerospace and Electronic Systems Magazine, IEEE, vol 21, no. 6, pp , [4] L. S. Nelson, America Identified: Biometric Technology and Society, Cambridge MA: The MIT Press, November 12, 2010, p [5] K. K. A.Ghany, H. A. Hefny, A. E. Hassanien and N. I. Ghali, «A Hybrid approach for biometric template security,» inside 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, İstanbul, [6] T. Caldwell, «Voice and facial recognition will drive mobile finance,» Biometric Technology Today, vol 2012, no. 10, pp. 2-3, [7] P. Matthew, «Autonomous synergy with biometric security and liveness detection,» inside Science and Information Conference (SAI), 2013, London, [8] C.-L. Tsai, C.-J. Chen and D.-J. Zhuang, «Secure OTP and Biometric Verification Scheme for Mobile Banking,» inside 2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing, Vancouver, BC, [9] M. Gordon and S. Sankaranarayanan, «Biometric Security Mechanism In Mobile Payments,» inside Wireless And Optical Communications Networks (WOCN), 2010 Seventh International Conference On, Colombo, [10] F. Omri, S. Foufou, R. Hamila and M. Jarraya, «Cloudbased mobile system for biometrics authentication,» inside ITS Telecommunications (ITST), th International Conference on, Tampere, [11] T. Caldwell, «Goode Intelligence predicts 130m growth in mobile phone biometrics,» Biometric Technology Today, vol 2012, no. 3, p. 2, [12] Inc., «Camera.Face,» Inc., 10 March [Online]. e/camera.face.html. [have accessed 12 March [13] Apple Inc., «SquareCam,» Apple Inc., 4 April [Online]. recam/introduction/intro.html. [have accessed 5 March [14] A. Inc., «CIFaceFeature Class Reference,» Apple Inc., 18 September [Online]. CoreImage/Reference/CIFaceFeature/Reference/Referen ce.html. [have accessed 5 March [15] Sensible Vision, Inc, «Face -FastAccess,» Sensible Vision, Inc, 13 February [Online]. blevision.android.fassoapplock&hl=tr. [have accessed 10 March [16] Visidon, «Visidon AppLock,» Visidon, 30 October [Online]. plock. [have accessed 10 March [17] Mobbeel, «MobbID, the multi biometric solutions for mobile applications,» Mobbeel.com, [Online]. [have accessed 8 March [18] Techfat.com, «Top 5 Face Apps For iphone 90
6 N. Yıldırım and A. Varol In 2013,» techfat.com, January [Online]. [have accessed 4 March [19] Mobbeel, «We release Signedoc and draw a tablet to celebrate it!,» Mobbeel.com, 26 February [Online]. [have accessed 7 March [20] Xyzmo, «Signature Capture for ipad and - Sign on the Dotted Screen,» Xyzmo Significant Signature Solutions, [Online]. [have accessed 10 March [21] R. Pizzoni, «Start Voice,» 26 December [Online]. P.VoiceSearchStart. [have accessed 10 March [22] L. Zipson, «Biometric access to mobiles in pipeline,» Biometric Technology Today, vol 2010, no. 8, p. 2, [23] SESTEK, «Sesli İmza,» sestek.com, [Online]. [have accessed 10 March [24] HoyosLabs, «HoyosID How it Works,» HoyosLabs, [Online]. [have accessed 13 March [25] J. Cipriani, «How to use face unlock on the Galaxy Nexus,» cnet.com, 6 January [Online] /how-to-use-face-unlock-on-the-galaxy-nexus/. [have accessed 11 March [26] C. Stamford, «Gartner Says 30 Percent of Organizations Will Use Biometric Authentication for Mobile Devices by 2016,» Gartner.com, 4 February [Online]. [have accessed 18 March [27] Goodeintelligence.com, «Goode Intelligence forecasts that the market for mobile biometric security products and services is set to grow and will generate over $8.3 billion revenue by 2018,» Goodeintelligence.com, 28 September [Online]. billion-revenue-by [have accessed 18 March [28] Apple Inc., «iphone 5s: Touch ID'yi kullanma,» Apple Inc., 31 January [Online]. &locale=tr_tr. [have accessed 8 March [29] Apple Inc., «iphone 5s: Touch ID güvenliği hakkında,» Apple Inc., 06 November [Online]. [have accessed 10 March [30] HTC Corporation, «About Fingrprint Scanner,» HTC Corporation, [Online]. [have accessed 13 March [31] Chip.com.tr, «Galaxy S5, iphone'a "hodri meydan" dedi!,» Chip.com.tr, 1 March [Online]. [have accessed 13 March [32] R. Blanco-Gonzalo, L. Diaz-Fernande, O. Miguel- Hurtado and R. Sanchez-Reillo, «Usability Evaluation of Biometrics in Mobile Environments,» inside Human System Interaction (HSI), 2013 The 6th International Conference on, Sopot,
Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means.
Definition Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means. Description Physiological biometrics is based
French Justice Portal. Authentication methods and technologies. Page n 1
French Justice Portal Authentication methods and technologies n 1 Agenda Definitions Authentication methods Risks and threats Comparison Summary Conclusion Appendixes n 2 Identification and authentication
Improving Online Security with Strong, Personalized User Authentication
Improving Online Security with Strong, Personalized User Authentication July 2014 Secure and simplify your digital life. Table of Contents Online Security -- Safe or Easy, But Not Both?... 3 The Traitware
May 2010. For other information please contact:
access control biometrics user guide May 2010 For other information please contact: British Security Industry Association t: 0845 389 3889 f: 0845 389 0761 e: [email protected] www.bsia.co.uk Form No. 181.
MOBILE VOICE BIOMETRICS MEETING THE NEEDS FOR CONVENIENT USER AUTHENTICATION. A Goode Intelligence white paper sponsored by AGNITiO
MOBILE VOICE BIOMETRICS MEETING THE NEEDS FOR CONVENIENT USER AUTHENTICATION A Goode Intelligence white paper sponsored by AGNITiO First Edition September 2014 Goode Intelligence All Rights Reserved Sponsored
Brainloop Secure Dataroom Version 8.30. QR Code Scanner Apps for ios Version 1.1 and for Android
Brainloop Secure Dataroom Version 8.30 QR Code Scanner Apps for ios Version 1.1 and for Android Quick Guide Brainloop Secure Dataroom Version 8.30 Copyright Brainloop AG, 2004-2015. All rights reserved.
SIGNificant e-signing for the ipad and Android
SIGNificant e-signing for the ipad and Android New Paperless Contracting for Tablets On-The-Go and In-Store By incorporating digital signature capturing into the age-old process of signing documents, companies
NFC & Biometrics. Christophe Rosenberger
NFC & Biometrics Christophe Rosenberger OUTLINE GREYC - E-payment & Biometrics Contactless transactions Biometric authentication Solutions Perspectives 2 GREYC Research Lab Research Group in Computer science,
Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER
with Convenience and Personal Privacy version 0.2 Aug.18, 2007 WHITE PAPER CONTENT Introduction... 3 Identity verification and multi-factor authentication..... 4 Market adoption... 4 Making biometrics
Authentication Levels. White Paper April 23, 2014
Summary White Paper April 23, 2014 This document describes levels of authentication that can be utilized for users known and unknown to gain access to applications and solutions. Summary... 1 Description...
Entrust IdentityGuard
+1-888-437-9783 [email protected] IdentiSys.com Distributed by: Entrust IdentityGuard is an award-winning software-based authentication enterprises and governments. The solution serves as an organization's
Framework for Biometric Enabled Unified Core Banking
Proc. of Int. Conf. on Advances in Computer Science and Application Framework for Biometric Enabled Unified Core Banking Manohar M, R Dinesh and Prabhanjan S Research Candidate, Research Supervisor, Faculty
22 nd NISS Conference
22 nd NISS Conference Submission: Topic: Keywords: Author: Organization: Tutorial BIOMETRICS - DEVELOPING THE ARCHITECTURE, API, ENCRYPTION AND SECURITY. INSTALLING & INTEGRATING BIOMETRIC SYSTEMS INTO
Device-Centric Authentication and WebCrypto
Device-Centric Authentication and WebCrypto Dirk Balfanz, Google, [email protected] A Position Paper for the W3C Workshop on Web Cryptography Next Steps Device-Centric Authentication We believe that the
Securing end-user mobile devices in the enterprise
IBM Global Technology Services Thought Leadership White Paper January 2012 Securing end-user mobile devices in the enterprise Develop an enforceable mobile security policy and practices for safer corporate
Multi-Factor Authentication for first time users
Multi-Factor Authentication for first time users **Multi-Factor Authentication will be required for all Duke University accounts on July 1 st, 2016.** What is Multi-Factor Authentication (MFA)?? Multi-factor
Northeast Bank Mobile Deposit Service FAQ
Northeast Bank Mobile Deposit Service FAQ What is Northeast Bank Mobile Deposit? What items can be deposited via Northeast Bank Mobile Deposit service? What items cannot be deposited through Northeast
How Secure is Authentication?
FIDO UAF Tutorial How Secure is Authentication? How Secure is Authentication? How Secure is Authentication? Cloud Authentication Password Issues Password might be entered into untrusted App / Web-site
3D PASSWORD. Snehal Kognule Dept. of Comp. Sc., Padmabhushan Vasantdada Patil Pratishthan s College of Engineering, Mumbai University, India
3D PASSWORD Tejal Kognule Yugandhara Thumbre Snehal Kognule ABSTRACT 3D passwords which are more customizable and very interesting way of authentication. Now the passwords are based on the fact of Human
Multi-Factor Authentication of Online Transactions
Multi-Factor Authentication of Online Transactions Shelli Wobken-Plagge May 7, 2009 Agenda How are economic and fraud trends evolving? What tools are available to secure online transactions? What are best
Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human
Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative
A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APPLICATION
A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APPLICATION Shermin Sultana 1, Asma Enayet 1 and Ishrat Jahan Mouri 1 1 Department of Computer Science and Engineering, Stamford
IDENTITY-AS-A-SERVICE IN A MOBILE WORLD. Cloud Management of Multi-Modal Biometrics
IDENTITY-AS-A-SERVICE IN A MOBILE WORLD Cloud Management of Multi-Modal Biometrics ImageWare Systems, Inc. Headquarters in San Diego, CA Offices worldwide (US, Canada, Germany, Mexico) Over 15 years of
Mobile App Frequently Asked Questions
Mobile App Frequently Asked Questions Basics 1. What can I do with AAFCU s Mobile App? AAFCU s Mobile App makes your everyday banking activities easy and convenient. Here's what we offer: Pay bills Transfer
Two-Factor Authentication over Mobile: Simplifying Security and Authentication
SAP Thought Leadership Paper SAP Mobile Services Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively Table
Alternative authentication what does it really provide?
Alternative authentication what does it really provide? Steve Pannifer Consult Hyperion Tweed House 12 The Mount Guildford GU2 4HN UK [email protected] Abstract In recent years many new technologies
solutions Biometrics integration
Biometrics integration Challenges Demanding access control and identity authentication requirements drive the need for biometrics. Regulations such as Sarbanes-Oxley (SOX), Health Insurance Portability
NC CJIN Governing Board. 13 October, 2011. George A. White
Advanced Authentication NC CJIN Governing Board 13 October, 2011 George A. White FBI CJIS ISO Brief Policy History Two year development Fully vetted by all state representation Criminal and civil Requirements
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management
REDCap project creation is not possible in the Mobile App
About the REDCap Mobile App REDCap software provides its online users with the ability to create and manage surveys and databases quickly and securely to facilitate data collection. The REDCap mobile app
This method looks at the patterns found on a fingertip. Patterns are made by the lines on the tip of the finger.
According to the SysAdmin, Audit, Network, Security Institute (SANS), authentication problems are among the top twenty critical Internet security vulnerabilities. These problems arise from the use of basic
Evolution of Smartphones And Android Operating System
Evolution of Smartphones And Android Operating System Evolution of Smartphones Background First telephone call was made on March 10, 1876 by Alexander Graham Bell. After that Pager continues to dominate
Biometric For Authentication, Do we need it? Christophe Rosenberger GREYC Research Lab - France
Biometric For Authentication, Do we need it? Christophe Rosenberger GREYC Research Lab - France OUTLINE Le pôle TES et le sans-contact Introduction User authentication GREYC - E-payment & Biometrics Introduction
Mobile Driver s License Solution
Mobile Driver s License Solution Secure, convenient and more efficient Improved identity protection through secure mobile driver s licenses The introduction of a mobile driver s license is a huge opportunity
What Smartphones and Tablets are supported by Smart Measure PRO?
What Smartphones and Tablets are supported by Smart Measure PRO? The following Smartphones and Tablets have gone through camera calibration procedure and provide the highest level of accuracy for capturing
Getting Started Introduction to iphones
Getting Started Introduction to iphones 1. Introduction to using iphones 2. Buttons on your iphone 3. Using the keyboard in your iphone 4. Scrolling through your apps 5. Texting and calling 6. Adding contacts
Scalable Authentication
Scalable Authentication Rolf Lindemann Nok Nok Labs, Inc. Session ID: ARCH R07 Session Classification: Intermediate IT Has Scaled Technological capabilities: (1971 2013) Clock speed x4700 #transistors
NetIQ Advanced Authentication Framework
NetIQ Advanced Authentication Framework Security Officer Guide Version 5.2.0 1 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 Authenticators Management 4 Card 8 Email OTP
A NOVEL APPORACH FOR ANDROID SECURITY SYSTEM Ritu B. Malhotra 1, Ashmita A. Fulzele 1, Rajeev N.Verma 2 1 UG Student,
International Journal of Computer Engineering and Applications, Volume X, Issue I, Jan. 16 www.ijcea.com ISSN 2321-3469 A NOVEL APPORACH FOR ANDROID SECURITY SYSTEM Ritu B. Malhotra 1, Ashmita A. Fulzele
Two Factor Authentication for VPN Access
Trends in cloud computing, workforce mobility, and BYOD policies have introduced serious new vulnerabilities for enterprise networks. Every few weeks, we learn about a new instance of compromised security.
Enhancing Web Application Security
Enhancing Web Application Security Using Another Authentication Factor Karen Lu and Asad Ali Gemalto, Inc. Technology & Innovations Austin, TX, USA Overview Introduction Current Statet Smart Cards Two-Factor
ENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
AUTHENTIFIERS. Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes
AUTHENTIFIERS Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes Authentify delivers intuitive and consistent authentication technology for use with smartphones,
Security Levels for Web Authentication using Mobile Phones
Security Levels for Web Authentication using Mobile Phones Anna Vapen and Nahid Shahmehri Department of computer and information science Linköpings universitet, SE-58183 Linköping, Sweden {annva,nahsh}@ida.liu.se
Smart Anytime, Safe Anywhere. Climax Home Portal Platform. Envisage and Enable a Connected Future
Smart Anytime, Safe Anywhere Climax Home Portal Platform Envisage and Enable a Connected Future Climax Home Portal Platform An IP/GPRS-Based Solution to Deliver Smart Home and Mobile Control Services Reliable
Chapter 5 Input. Chapter 5 Objectives. What Is Input? What Is Input? The Keyboard. The Keyboard
Chapter 5 Objectives Chapter 5 Input Define input List characteristics of of a keyboard Describe different mouse types and how they work Summarize how pointing devices work Explain how a digital camera
Securing Mobile Cloud Using Finger Print Authentication
Securing Mobile Cloud Using Finger Print Authentication IehabALRassan, HananAlShaher Department of Computer Science,King Saud University,Riyadh, Saudi Arabia ABSTRACT Mobile cloud computing becomes part
Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and
Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and procedures to govern who has access to electronic protected
Reviewer Guide Core Functionality
securing your personal data Sticky Password Reviewer Guide Core Functionality Sticky Password is the password manager for the entire lifecycle of your passwords. Strong passwords the built-in password
Setup Guide-Mobility ActiveSync Hosted Exchange Configuration
Setup Guide-Mobility ActiveSync Hosted Exchange Configuration Live Customer Support: 866-428-0128 Mobility Setup ActiveSync Page 2 of 15 Setup Instruction for Mobile Device Connection to Exchange ActiveSync
DigitalPersona Pro Enterprise
DigitalPersona Pro Enterprise Version 5.3 Frequently Asked Questions 2012 DigitalPersona, Inc. All Rights Reserved. All intellectual property rights in the DigitalPersona software, firmware, hardware and
Mobile Device Support Model
[Type here] Mobile Device Support Model This document defines the level of support the university offers for mobile devices. Mobile devices are defined as portable handheld devices such as smartphones
Securing e-government Web Portal Access Using Enhanced Two Factor Authentication
Securing e-government Web Portal Access Using Enhanced Two Factor Authentication Ahmed Arara 1, El-Bahlul Emhemed Fgee 2, and Hamdi Ahmed Jaber 3 Abstract This paper suggests an advanced two-factor authentication
Research Article. Research of network payment system based on multi-factor authentication
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(7):437-441 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Research of network payment system based on multi-factor
Mobile Banking FAQ for Business
Mobile Banking FAQ for Business General Questions 1. What is National Bank of Arizona Business Mobile Banking? Mobile Banking provides anytime access to your eligible account(s) from select mobile phones
VPAT for Apple ipad Air 2
VPAT for Apple ipad Air 2 The following Voluntary Product Accessibility information refers to the Apple ipad Air 2 running ios 8 or later. For more information on the accessibility features of the ipad
Voice Authentication for ATM Security
Voice Authentication for ATM Security Rahul R. Sharma Department of Computer Engineering Fr. CRIT, Vashi Navi Mumbai, India [email protected] Abstract: Voice authentication system captures the
interactive product brochure :: Nina: The Virtual Assistant for Mobile Customer Service Apps
interactive product brochure :: Nina: The Virtual Assistant for Mobile Customer Service Apps This PDF contains embedded interactive features. Make sure to download and save the file to your computer to
WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS
WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user
Mobile Banking Frequently Asked Questions
Effective August 20, 2015 General Questions What are CBT Mobile Banking and CBT Business Mobile Banking? CBT Mobile Banking and CBT Business Mobile Banking provide anytime access to your eligible California
Security Model in E-government with Biometric based on PKI
Security Model in E-government with Biometric based on PKI Jaafar.TH. Jaafar Institute of Statistical Studies and Research Department of Computer and Information Sciences Cairo, Egypt Nermin Hamza Institute
One-Time Password Contingency Access Process
Multi-Factor Authentication: One-Time Password Contingency Access Process Presenter: John Kotolski HRS Security Officer Topics Contingency Access Scenarios Requesting a Temporary One-Time Password Reporting
mcashier User Guide To accept payments To cancel a payment
mcashier User Guide To accept payments 1. Enter the purchase amount in the app. If desired, you can enter a reference under the amount (e.g. the product name). The reference will appear on the receipt.
IDRBT Working Paper No. 11 Authentication factors for Internet banking
IDRBT Working Paper No. 11 Authentication factors for Internet banking M V N K Prasad and S Ganesh Kumar ABSTRACT The all pervasive and continued growth being provided by technology coupled with the increased
EBA STRONG AUTHENTICATION REQUIREMENTS
EBA STRONG AUTHENTICATION REQUIREMENTS FOR INTERNET PAYMENTS IN EU TO BE IMPLEMENTED BY AUGUST 1 ST 2015 LEGAL WHITEPAPER What are the strong authentication requirements under EBA Guidelines which European
Spring Hill State Bank Mobile Banking FAQs
Spring Hill State Bank Mobile Banking FAQs What is Mobile Banking? Mobile Banking enables you to access your account information using the Bank online banking website. You must first be enrolled as an
Workday Mobile Security FAQ
Workday Mobile Security FAQ Workday Mobile Security FAQ Contents The Workday Approach 2 Authentication 3 Session 3 Mobile Device Management (MDM) 3 Workday Applications 4 Web 4 Transport Security 5 Privacy
Accessing the bank account without card and password in ATM using biometric technology
Accessing the bank account without card and password in ATM using biometric technology Mini Agarwal [1] and Lavesh Agarwal [2] Teerthankar Mahaveer University Email: [email protected] [1], [email protected]
Sophos Mobile Control User guide for Apple ios. Product version: 4
Sophos Mobile Control User guide for Apple ios Product version: 4 Document date: May 2014 Contents 1 About Sophos Mobile Control...3 2 About this guide...4 3 Login to the Self Service Portal...5 4 Set
Chapter 5 Understanding Input. Discovering Computers 2012. Your Interactive Guide to the Digital World
Chapter 5 Understanding Input Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Define input and differentiate among a program, command, and user response Identify
Ericsson Mobile digital identity
Ericsson Mobile digital identity (Views on delivering solutions and the Business case for the banking and finance community) pedro calderon head of Product line Authentication & digital identity Ericsson
Two-Factor Authentication Making Sense of all the Options
Two-Factor Authentication Making Sense of all the Options The electronic age we live in is under attack by information outlaws who love profiting from the good record of others. Now more than ever, organizations
Question Bank June 2015 R001 Mock
Bank June 2015 R001 Mock Jan13 1 Spec 1 Spec 7 Jan15 7 1. The software needed to create individual graphics for animated cartoons Richard uses his smartphone to take a photograph. a) State two ways in
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 10 Authentication and Account Management
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 10 Authentication and Account Management Objectives Describe the three types of authentication credentials Explain what single sign-on
Mobile Operating Systems & Security
Mobile Operating Systems & Security How can I protect myself? Operating Systems Android Apple Microsoft What do they do? operate smartphones, tablets, watches and other mobile devices includes touchscreens
RingCentral Meetings User Guide. Video Conference. Web Share.
RingCentral Meetings User Guide Video Conference. Web Share. RingCentral User Guide Meetings Table of Contents Table of Contents 3 System requirements 4 Download & Install 6 Meet: Host a Meeting 8 Join
Mobile Banking FAQ Page 1 of 9
Page 1 of 9 allows anyone with existing online banking access to see their account information from a mobile phone. can be Text Banking, Mobile Browser Banking or Smartphone App Banking. General Questions
Multi-Factor Authentication Core User Policy and Procedures
Multi-Factor Authentication Core User Policy and Procedures Core Users with access to other people s sensitive or restrictive information must use one-time passwords (OTP) generated from approved fobs
Multi-Factor Authentication
Enhancing network security through the authentication process Multi-Factor Authentication Passwords, Smart Cards, and Biometrics INTRODUCTION Corporations today are investing more time and resources on
Secure Your Enterprise with Usher Mobile Identity
Secure Your Enterprise with Usher Mobile Identity Yong Qiao, Vice President of Software Engineering & Chief Security Architect, MicroStrategy Agenda Introduction to Usher Unlock the enterprise Dematerialize
Information Technology Department. Exchange 2010 E-Mail Migration
Information Technology Department Exchange 2010 E-Mail Migration Please note: accessing your mailbox during its migration could result in irreparable damage to your email. Please read the instructions
Development of Academic Attendence Monitoring System Using Fingerprint Identification
164 Development of Academic Attendence Monitoring System Using Fingerprint Identification TABASSAM NAWAZ, SAIM PERVAIZ, ARASH KORRANI, AZHAR-UD-DIN Software Engineering Department Faculty of Telecommunication
Security in an Increasingly Threatened World. SMS: A better way of doing Two Factor Authentication (2FA)
Security in an Increasingly Threatened World SMS: A better way of doing Two Factor Authentication (2FA) January 2015 The Proliferation of The App World The revolution of the smart phone forever affected
The Implementation of Face Security for Authentication Implemented on Mobile Phone
The Implementation of Face Security for Authentication Implemented on Mobile Phone Emir Kremić *, Abdulhamit Subaşi * * Faculty of Engineering and Information Technology, International Burch University,
Role of Multi-biometrics in Usable Multi- Factor Authentication
Role of Multi-biometrics in Usable Multi- Factor Authentication Dr. Nalini K Ratha* IBM T.J. Watson Research Center Yorktown Heights, NY 10598 [email protected] *: In collaboration with colleagues from
White Paper PalmSecure truedentity
White Paper PalmSecure truedentity Fujitsu PalmSecure truedentity is used for mutual service and user authentication. The user's identity always remains in the possession of the user. A truedentity server
Is there a fee to use U-Deposit? No, U-Deposit is a free*, convenient service provided to UNITED SA Federal Credit Union members.
U-Deposit: FAQs What is U-Deposit? Is U-Deposit secure? What are the requirements to use U-Deposit? Is there a fee to use U-Deposit? How can I sign up for U-Deposit? What are the hardware and software
W.A.R.N. Passive Biometric ID Card Solution
W.A.R.N. Passive Biometric ID Card Solution Updated November, 2007 Biometric technology has advanced so quickly in the last decade that questions and facts about its cost, use, and accuracy are often confused
How Secure is Authentication?
U2F & UAF Tutorial How Secure is Authentication? 2014 1.2bn? 2013 397m Dec. 2013 145m Oct. 2013 130m May 2013 22m April 2013 50m March 2013 50m Cloud Authentication Password Issues Password might be entered
