TY - GEN
T1 - The "SecurePhone"
T2 - International Conference on Security and Cryptography, SECRYPT 2006
AU - Ricci, R.
AU - Chollet, G.
AU - Crispino, M. V.
AU - Jassim, S.
AU - Koreman, J.
AU - Morris, A.
AU - Olivar-Dimas, M.
AU - García-Salicetti, S.
AU - Soria-Rodríguez, P.
PY - 2006/12/1
Y1 - 2006/12/1
N2 - This article presents an overview of the SecurePhone project, with an account of the first results obtained. SecurePhone's primary aim is to realise a mobile phone prototype - the "SecurePhone" - in which biometrical authentication enables users to deal secure, dependable transactions over a mobile network. The SecurePhone is based on a commercial PDA-phone, supplemented with specific software modules and a customised SIM card. It integrates in a single environment a number of advanced features: access to cryptographic keys through strong multimodal biometric authentication; appending and verification of digital signatures; real-time exchange and interactive modification of (e-signed) documents and voice recordings. SecurePhone's "biometric recogniser" is based on original research. A fused combination of three different biometric methods - speaker, face and handwritten signature verification - is exploited, with no need for dedicated hardware components. The adoption of non-intrusive, psychologically neutral biometric techniques is expected to mitigate rejection problems that often inhibit the social use of biometrics, and speed up the spread of e-signature technology. Successful biometric authentication grants access to SecurePhone's built-in e-signature services through a user-friendly interface. Special emphasis is accorded to the definition of a trustworthy security chain model covering all aspects of system operation.
AB - This article presents an overview of the SecurePhone project, with an account of the first results obtained. SecurePhone's primary aim is to realise a mobile phone prototype - the "SecurePhone" - in which biometrical authentication enables users to deal secure, dependable transactions over a mobile network. The SecurePhone is based on a commercial PDA-phone, supplemented with specific software modules and a customised SIM card. It integrates in a single environment a number of advanced features: access to cryptographic keys through strong multimodal biometric authentication; appending and verification of digital signatures; real-time exchange and interactive modification of (e-signed) documents and voice recordings. SecurePhone's "biometric recogniser" is based on original research. A fused combination of three different biometric methods - speaker, face and handwritten signature verification - is exploited, with no need for dedicated hardware components. The adoption of non-intrusive, psychologically neutral biometric techniques is expected to mitigate rejection problems that often inhibit the social use of biometrics, and speed up the spread of e-signature technology. Successful biometric authentication grants access to SecurePhone's built-in e-signature services through a user-friendly interface. Special emphasis is accorded to the definition of a trustworthy security chain model covering all aspects of system operation.
KW - Biometric authentication
KW - Electronic signature
KW - Encryption
KW - M-business
KW - Mobile communications
KW - Multimodal biometrics
KW - Security
M3 - Conference contribution
AN - SCOPUS:77954135455
SN - 9728865635
SN - 9789728865634
T3 - SECRYPT 2006 - International Conference on Security and Cryptography, Proceedings
SP - 9
EP - 16
BT - SECRYPT 2006 - International Conference on Security and Cryptography, Proceedings
Y2 - 7 August 2006 through 10 August 2006
ER -