Downloads: 116 | Views: 279
Research Paper | Computer Science & Engineering | India | Volume 4 Issue 12, December 2015 | Popularity: 6.1 / 10
Security for Android Mobile Phones using Biometric Authentication against Factory Reset
Suchita Rane, Dr. Narendra Shekokar
Abstract: Android Mobile devices are secured using various mechanisms like pattern, pin, and password. Biometric Authentication is an upcoming technology accepted by various android mobile manufactures for better security and with change in technology, time this mechanisms are vulnerable to various attacks like factory reset. Factory Reset will erase all the settings in the device and makes device vulnerable for hackers to misuse it. This paper proposes a mechanism to overcome against hard reset as well as factory reset through settings by allowing person to perform factory reset operation only after passing biometric authentication and using correct back-up code. Mobile device can be more secured by using biometric authentication with other factors like security question, alternate email-id, and authentication code generation algorithm.
Keywords: Biometric, Factory Reset, Security, Mobile devices
Edition: Volume 4 Issue 12, December 2015
Pages: 608 - 612
DOI: https://www.doi.org/10.21275/NOV152056
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 656 | Views: 2003
Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Downloads: 401 | Views: 719
Computer Science & Engineering, India, Volume 7 Issue 11, November 2018
Pages: 1951 - 1955Hadoop Performance Improvement using Metadata and Securing with Oauth Token
Swapnali A. Salunkhe, Amol B. Rajmane
Downloads: 386 | Views: 700
Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1 - 3Comparative Study of Conventional Desktop Computer and Compute Stick
Aadarsh Sooraj, Sooraj G.
Downloads: 354 | Views: 698
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 629 - 632Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Downloads: 336 | Views: 688
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2148 - 2152The Impact and Application of 3D Printing Technology
Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera