Provided by: The International Journal of Innovative Research in Computer and Communication Engineering
Date Added: Oct 2014
The use of biometric person recognition for secure access to restricted data services using a mobile phone with Internet connection has been dealt. Biometrics can be divided into two categories based upon the underlying characteristic they are using: physiological and behavioral. There are three general categories of user authentication: something the users know, e.g., passwords and Personal-Identification Numbers (PINs), something they have (e.g., tokens) and something they are (e.g., biometrics). Today, with the advancement of mobile handsets and wireless networking, mobile devices have both the network access and computing capacity to provide users with a diverse range of services (e.g., secure payment, e-banking, e-commerce (better: m-commerce), etc.).