User Authentication for Mobile Devices: A Composite Approach

Document Type

Conference Proceeding

Faculty

Faculty of Computing, Health and Science

School

School of Computer and Information Science / Centre for Security Research

RAS ID

2727

Comments

Clarke, N., & Furnell, S. (2005). User authentication for mobile devices: a composite approach. In proceedings of the 2nd Australian Nonprofit and Social Marketing Conference. Melbourne, VIC: Deakin University

Abstract

With the ever-increasing functionality and services accessible via mobile telephones, there is a strong argument that the level of user authentication implemented on the devices should be extended beyond the Personal Identification Number (PIN) that has traditionally been used. This paper proposes the use of more advanced biometric methods as an alternative, and proceeds to explain how, through the use of a portfolio of authentication techniques it is possible to provide a robust, accurate and transparent authentication mechanism for mobile devices. An Intelligent Authentication Management System (IAMS) is proposed that provides a continuous confidence level in the identity of the user, removing access to sensitivity services and information with low confidence levels and providing automatic access with higher confidence levels.

This document is currently not available here.

Share

 
COinS