Search Results - transactions+security

2 Results Sort By:
Authenticating a User on a Mobile Device
Protecting mobile devices from unauthorized access is becoming more than indispensable these days. In particular, mobile devices such as smartphones and tablets are pervasive and store increasingly highly sensitive information about a user (e.g., contacts, usernames, passwords, emails, browser histories, business secrets, health conditions, etc.)....
Published: 2/27/2023   |   Inventor(s): Yimin Chen, Yanchao Zhang
Keywords(s): Authentication, Detection, Mobile technology, Recognition imaging, Security, Transactions Security
Category(s): Computing & Information Technology, Physical Science, Intelligence & Security
Radio-Frequency (RF) Imaging Sensor for Advanced Security Fingerprint Biometrics and Mobile Health Monitoring
Current portable and wearable devices use fingerprint analysis for secure authentication. The fingerprint pattern systems analyze only the surface morphology of the fingerprint, making it easy for hackers to spoof and bypass authentication. RF signals can collect tissue information beyond the surface of the finger and can provide increased security...
Published: 2/23/2023   |   Inventor(s): Georgios Trichopoulos, Panagiotis Theofanopoulos
Keywords(s): Authentication, Cyber Security, Cyber-Physical System, Engineering, Fingerprint, Graphenes, Health Monitoring, Medical Devices and Imaging, Mobile Biometrics, Real-Time System, Screening, Smart Devices, Transactions Security
Category(s): Chemical/Biological Sensors, Diagnostic Assays/Devices, Medical Diagnostics/Sensors, Physical Science, Intelligence & Security