2011 IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob) 2011
DOI: 10.1109/wimob.2011.6085412
|View full text |Cite
|
Sign up to set email alerts
|

SenGuard: Passive user identification on smartphones using multiple sensors

Abstract: Abstract-User identification and access control have become a high demand feature on mobile devices because those devices are wildly used by employees in corporations and government agencies for business and store increasing amount of sensitive data. This paper describes SenGuard, a user identification framework that enables continuous and implicit user identification service for smartphone. Different from traditional active user authentication and access control, SenGuard leverages availability of multiple se… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
86
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 141 publications
(86 citation statements)
references
References 10 publications
0
86
0
Order By: Relevance
“…The scores are combined periodically taking into account their contribution to the final score. In SenGaurd [15] the authors propose using interactive and passive biometrics including touchscreen gestures, microphone, GPS, cellular tower, and motion sensors.…”
Section: Related Workmentioning
confidence: 99%
“…The scores are combined periodically taking into account their contribution to the final score. In SenGaurd [15] the authors propose using interactive and passive biometrics including touchscreen gestures, microphone, GPS, cellular tower, and motion sensors.…”
Section: Related Workmentioning
confidence: 99%
“…Research is currently investigating the possibility of combining pattern-PIN with other biometric modalities such as voice or face provided by other device peripherals, and keystroke dynamics on virtual screen-based keyboard (Shi, Yang, Jiang, Yang, & Xiong, 2011) Implementation of biometric systems using these devices leverage two parallel properties, both relating to the mobile nature of the systems; the portability of a device demands greater security of the device itself in terms of access to the data contained in it and the communication attributes of the system means across to the devices will open to user to potentially confidential web-based data sources.…”
Section: Touch Motionmentioning
confidence: 99%
“…In [11] and later in [16], they attempted to identify a person using inertial sensors. They detect and classify behavior and events and showed it's possible to separate the data into classes.…”
Section: B Human Identification Using Inertial Sensorsmentioning
confidence: 99%