Tuesday, December 10, 2019

Fast Authentication Approach on Mobile Devices-Free-Samples

Question: Discuss abouts the Fast Authentication Approach on Mobile Devices. Answer: Feng et al. (2012) in their paper have attempted at solving the problems associated with the authentication of the smartphones. To achieve the objective, the authors have devised a technology for easy and secure authentication of the mobile devices. The devised technology goes by the name of FAST (Finger-gestures Authentication System Using Touchscreen). The technology extracts touch data from touch enabled smartphones, for the deemed purpose the subject equips a digitised sensor glove that was developed with assistance from off-the-shelf components. The paper has been well documented in 5 different sections (excluding the introduction and conclusion) with specified purpose for each of them. The first of the above mentioned five sections is the Background section where the authors have cited references to different factors and terms that are associated with the development of the subject of the paper. An elaborate idea of the FAR (False Accept Rate) and FRR (False Reject Ratio) and what level should be maintained for the security of the device. Followed by the other factor that will affect the technology that is the classifiers. The technology is based on the classification algorithm and hence the discussion. Following that the next section The FAST Framework and Design. describes on how the past works were explored to design the most suitable solution for the considered problem. The deemed section also offers an insight into the working of the developed technology. The sections suggest that FAST gathers some specific touch gesture data such as the X and Y coordinates, the pressure applied on the touch points, motion speed of the touch, finger motion direction along with multi-point distance out of the 53 features of touch gesture. The collected data are then stored in two separate databases, one of which is training of the classifiers and the others for testing. As stated earlier the deemed technology monitors the touch gesture which it latter optimises together to determine the users authentication approach. Two sections following the above-discussed section are the experimental sections where the experiments were done to evaluate the technology and cite the results of the experiment. The results support the facts claimed by the authors and clarity of the results are visible from the graphs and stats offered by them. Finally, the authors have showered some light on the related work over the problem they have attempted at solving before concluding the paper. The authors have devised the report with appropriate structuring to make it easy for the readers in understanding their objective. The development of the technology has also been explained appropriately by discussing the facts, factors and the stats associated with the development process. However, the authors have limited the discussion over the factors to their basics and have not offered a more precise definition of the roles that those factors will play in the technology. The future of the technology, how they plan to use it is also missing, and most importantly the conclusion of the report is very concise. Overall, it can be stated that the report will be interesting for the readers with limited knowledge, however, the scholars and researchers would expect more from it.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.