Restricting Unauthorized Access Using Biometrics In Mobile

S.Vignesh, M.Narayanan

Abstract: The use of biometric person recognition for secure access to restricted data /services using a mobile phone with Internet connection have been dealt. Biometrics can be divided into two categories based upon the underlying characteristic they are using: physiological and behavioral. There are three general categories of user authentication: 1) something you know, e.g., passwords and personal-identification numbers (PINs), 2) something you have (e.g., tokens), and 3) something you are (e.g., biometrics). Today, with the advancement of mobile handsets and wireless networking, mobile devices have both the network access and computing capacity to provide users with a diverse range of services (e.g, secure payment , e-banking, e-commerce (better: m-commerce), etc.).Then, a very popular device, with increasing functionality and access to personally and financially sensitive information; therefore, the requirement for additional and/or advanced authentication mechanisms is essential.

Keywords: Biometrics, network access, authentication mechanism, personal identification number.

Title: Restricting Unauthorized Access Using Biometrics In Mobile

Author: S.Vignesh, M.Narayanan

International Journal of Computer Science and Information Technology Research

ISSN 2348-120X (online), ISSN 2348-1196 (print)

Research Publish Journals

Vol. 2, Issue 2, April - June 2014

Citation
Share : Facebook Twitter Linked In

Citation
Restricting Unauthorized Access Using Biometrics In Mobile by S.Vignesh, M.Narayanan