Date Added: Apr 2012
In the mobile computing industry, Smartphones and iPads have emerged as realistic substitutes for notebook computers. For example, the iPad is designed to support a variety of media, including video, sound, and websites. It is different from a cell phone in that it has the ability to use rich e-learning content. However, the iPad does not include special structures for user authentication. For example, it does not have a camera or a device for fingerprint authentication. The purpose of this paper is to explain how to perform effective personal authentication using the built-in capabilities of the iPad or Smartphone.