SecurePhone: A mobile phone with biometric authentication and e-signature support for dealing secure transactions on the fly

  • R. Ricci
  • , G. Chollet
  • , M. V. Crispino
  • , S. Jassim
  • , J. Koreman
  • , M. Olivar-Dimas
  • , S. Garcia-Salicetti
  • , P. Soria-Rodríguez

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

This article presents an overview of the SecurePhone project, with an account of the first results obtained. SecurePhone's primary aim is to realise a mobile phone prototype - the "SecurePhone" - in which biometrical authentication enables users to deal secure, dependable transactions over a mobile network. The SecurePhone is based on a commercial PDA-phone, supplemented with specific software modules and a customised SIM card. It integrates in a single environment a number of advanced features: access to cryptographic keys through strong multimodal biometric authentication; appending and verification of digital signatures; real-time exchange and interactive modification of (e-signed) documents and voice recordings. SecurePhone's "biometric recogniser" is based on original research. A fused combination of three different biometric methods - speaker, face and handwritten signature verification - is exploited, with no need for dedicated hardware components. The adoption of non-intrusive, psychologically neutral biometric techniques is expected to mitigate rejection problems that often inhibit the social use of biometrics, and speed up the spread of e-signature technology. Successful biometric authentication grants access to SecurePhone's built-in e-signature services through a user-friendly interface. Special emphasis is accorded to the definition of a trustworthy security chain model covering all aspects of system operation. The SecurePhone is expected to boost m-commerce and open new scenarios for m-business and m-work, by changing the way people interact and by improving trust and confidence in information technologies, often considered intimidating and difficult to use. Exploitation plans will also explore other application domains (physical and logical access control, securised mobile communications).

Original languageEnglish
Title of host publicationMobile Multimedia/Image Processing for Military and Security Applications
DOIs
Publication statusPublished - 23 Aug 2006
Externally publishedYes
EventMobile Multimedia/Image Processing for Military and Security Applications - Kissimmee, FL, United States
Duration: 20 Apr 200620 Apr 2006

Publication series

NameProceedings of SPIE - The International Society for Optical Engineering
Volume6250
ISSN (Print)0277-786X

Conference

ConferenceMobile Multimedia/Image Processing for Military and Security Applications
Country/TerritoryUnited States
CityKissimmee, FL
Period20/04/0620/04/06

Keywords

  • Biometric authentication
  • Electronic signature
  • Encryption
  • M-business
  • Mobile communications
  • Multimodal biometrics
  • Security

Fingerprint

Dive into the research topics of 'SecurePhone: A mobile phone with biometric authentication and e-signature support for dealing secure transactions on the fly'. Together they form a unique fingerprint.

Cite this