SINCE 2004

  • 0

      0 Item in Bag


      Your Shopping bag is empty

      CHECKOUT
  • Notice

    • ALL COMPUTER, ELECTRONICS AND MECHANICAL COURSES AVAILABLE…. PROJECT GUIDANCE SINCE 2004. FOR FURTHER DETAILS CALL 9443117328

    Projects > COMPUTER > 2019 > NON IEEE > APPLICATION

    Active Authentication on Mobile Devices via Stylometry Application


    Abstract

    Active authentication is the process or action of verifying the identity of a user or process. A mobile device is a computing device small enough to hold and operate in the hand. This propose work motivates the mobile with high level active authentication. The mobile owner uses the pattern locks to lock the mobile apps. The mobile owner can able to lock all the apps or specified apps in the mobile. The mobile ask the mobile user to enter the pattern to confirm the pattern and also the security questions are provided to the mobile owner for verification process. The mobile owner can also change the lock pattern. If the mobile was missed and other third party user try to open the lock of the mobile for more than three times, then the message with the location of the mobile was send to the mobile owners mail id. Overall security is achieved and the notification message with the location helps the user to identify their mobile.


    Existing System

    A lot of research is being conducted into improving the usability and security of phone-unlocking. There is however a severe lack of scientific data on users’ current unlocking behaviour and perceptions. We performed an online survey (n = 260) and a one-month field study (n = 52) to gain insights into real world (un)locking behavior of smartphone users. One of the main goals was to find out how much overhead unlocking and authenticating adds to the overall phone usage and in how many unlock interactions security (i.e. authentication) was perceived as necessary. We also investigated why users do or do not use a lock screen and how they cope with smartphone-related risks, such as shoulder surfing or unwanted accesses.


    Proposed System

    In the proposed system, active authentication is the process or action of verifying the identity of a user or process. A mobile device is a computing device small enough to hold and operate in the hand. This propose work motivates the mobile with high level active authentication. The mobile owner uses the pattern locks to lock the mobile apps. The mobile owner can able to lock all the apps or specified apps in the mobile. The mobile ask the mobile user to enter the pattern to confirm the pattern and also the security questions are provided to the mobile owner for verification process. The mobile owner can also change the lock pattern. If the mobile was missed and other third party user try to open the lock of the mobile for more than three times, then the message with the location of the mobile was send to the mobile owners mail id. Overall security is achieved and the notification message with the location helps the user to identify their mobile.


    Architecture


    ARCHITECTURE DIAGRAM


    FOR MORE INFORMATION CLICK HERE