International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 117 | Views: 252

Research Paper | Information Technology | Malaysia | Volume 8 Issue 10, October 2019 | Popularity: 6.7 / 10


     

Virtual OS of Semi-Authorized in a Smartphones

Moceheb Lazam Shuwandy


Abstract: Identity theft is one of the biggest challenges to protecting electronic devices, especially in protecting Smartphones. Authentication and its techniques are the most vulnerable to problems, such as traditional, pattern password and PIN code etc. Inaddition, biometric techniques are safer than normal authentication methods. Therefore, these techniques are related to thecharacteristics of human beings and used to authenticate who owns them. Besides, authentication is granted by an Operating SystemOS to protect authentication data onto theft and manipulation. However, local OS s are vulnerable to problems such as hackerattacks, and systems and Multi-trying to enter the device when it stole. On the other hand, the connection to the OS should beavailable when requesting authentication in a Smartphone, otherwise the user will not be able to access his device. In this paper, wediscuss the failure connected to OS in order to obtain authentication, and some cases lead to non-authentication. We are discussingthe user's access to the Smartphone by any biometric devices currently in use. When using of the virtual OS if the OS fails todetermine the real Authorized, by creating a Virtual OS (VOS) on the Smartphone. For example: a user cans only access to hisdevice, when obtain on the Authorized form of VOS. It has the same specifications and environment, as the original OS.


Keywords: Virtual OS, Authentication, Local OS, Semi-Authorized, Smartphone


Edition: Volume 8 Issue 10, October 2019


Pages: 665 - 668



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Moceheb Lazam Shuwandy, "Virtual OS of Semi-Authorized in a Smartphones", International Journal of Science and Research (IJSR), Volume 8 Issue 10, October 2019, pp. 665-668, https://www.ijsr.net/getabstract.php?paperid=ART20201883, DOI: https://www.doi.org/10.21275/ART20201883



Similar Articles

Downloads: 0

Research Paper, Information Technology, India, Volume 11 Issue 7, July 2022

Pages: 133 - 137

Wearable Computers of Leading Edge Generation and their Mystifying Mechanic's

Smital Wagh, Gunjan Behl

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Technology, India, Volume 9 Issue 4, April 2020

Pages: 1850 - 1857

Securing Remote Work Environments in Telecom: Implementing Robust Cybersecurity Strategies to Secure Remote Workforce Environments in Telecom, Focusing on Data Protection and Secure Access Mechanisms

Jeevan Manda

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Masters Thesis, Information Technology, Zimbabwe, Volume 11 Issue 4, April 2022

Pages: 383 - 388

Detection and Mitigation of Rogue Access Points

Hope Makoni

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Informative Article, Information Technology, India, Volume 12 Issue 12, December 2023

Pages: 2114 - 2119

Zero Knowledge Proof Techniques in PAM Authentication

Sri Kanth Mandru

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Technology, United States of America, Volume 11 Issue 8, August 2022

Pages: 1549 - 1559

Cybersecurity in Microservices Architectures: Protecting Distributed Retail Applications in Cloud Environments

Yash Jani, Arth Jani, Dhaval Gogri

Share this Article
Top