Restricting Unauthorized Access Using Biometrics In Mobile

The use of biometric person recognition for secure access to restricted data/services using a mobile phone with Internet connection have been dealt. Biometrics can be divided into two categories based upon the underlying characteristic they are using: physiological and behavioral. There are three general categories of user authentication: something the user know, e.g., passwords and Personal-Identification Numbers (PINs), something the user have (e.g., tokens) and something the user are (e.g., biometrics). Today, with the advancement of mobile handsets and wireless networking, mobile devices have both the network access and computing capacity to provide users with a diverse range of services (e.g., secure payment, e-banking, e-commerce (better: m-commerce), etc.).

Provided by: Creative Commons Topic: Security Date Added: Jun 2014 Format: PDF

Find By Topic