Restricting Unauthorized Access Using Biometrics In Mobile

Download Now
Provided by: Creative Commons
Topic: Security
Format: PDF
The use of biometric person recognition for secure access to restricted data/services using a mobile phone with Internet connection have been dealt. Biometrics can be divided into two categories based upon the underlying characteristic they are using: physiological and behavioral. There are three general categories of user authentication: something the user know, e.g., passwords and Personal-Identification Numbers (PINs), something the user have (e.g., tokens) and something the user are (e.g., biometrics). Today, with the advancement of mobile handsets and wireless networking, mobile devices have both the network access and computing capacity to provide users with a diverse range of services (e.g., secure payment, e-banking, e-commerce (better: m-commerce), etc.).
Download Now

Find By Topic