A Fingerprint Authentication System Based on Mobile Phone

Author(s):  
Qi Su ◽  
Jie Tian ◽  
Xinjian Chen ◽  
Xin Yang
2019 ◽  
Vol 5 (2) ◽  
pp. 19-28
Author(s):  
Mubarak Adetunji Ojewale ◽  
Patrick Meumeu Yomsi

One thing can be said to be common to all forms of debit card fraud – authentication bypass. This implies that a secure debit card transaction system can only be guaranteed by a safe and reliable authentication system. Many approaches have been adopted to ensure a secure authentication system, but often, these approaches are either focused on the Automated Teller Machines (ATM)/Point of Sales (POS) terminals or Online/e-commerce transactions, thus not providing full security on both fronts. In this work, we address this problem by adopting a multi-factor debit card system that uses a combination of the traditional Personal Identification Number code (PIN) and the mobile-phone delivered One-Time Password (OTP) with a biometric authentication option (fingerprint). We demonstrate that this approach ensures the security of both online and terminal transactions. The fingerprint option makes it easy to use by people who find memorizing PINs difficult.


2014 ◽  
Vol 35 (3) ◽  
pp. 158-165 ◽  
Author(s):  
Christian Montag ◽  
Konrad Błaszkiewicz ◽  
Bernd Lachmann ◽  
Ionut Andone ◽  
Rayna Sariyska ◽  
...  

In the present study we link self-report-data on personality to behavior recorded on the mobile phone. This new approach from Psychoinformatics collects data from humans in everyday life. It demonstrates the fruitful collaboration between psychology and computer science, combining Big Data with psychological variables. Given the large number of variables, which can be tracked on a smartphone, the present study focuses on the traditional features of mobile phones – namely incoming and outgoing calls and SMS. We observed N = 49 participants with respect to the telephone/SMS usage via our custom developed mobile phone app for 5 weeks. Extraversion was positively associated with nearly all related telephone call variables. In particular, Extraverts directly reach out to their social network via voice calls.


2011 ◽  
Author(s):  
Syed Khurram Mehdi ◽  
Rana Saba Sultan

Author(s):  
Naomi F. Glasscock ◽  
Michael S. Wogalter
Keyword(s):  

2018 ◽  
Author(s):  
Valentina Boursier ◽  
Valentina Manna

Sign in / Sign up

Export Citation Format

Share Document