Downloads: 117 | Views: 123
Research Paper | Information Technology | Malaysia | Volume 8 Issue 10, October 2019
Virtual OS of Semi-Authorized in a Smartphones
Moceheb Lazam Shuwandy
Abstract: Identity theft is one of the biggest challenges to protecting electronic devices, especially in protecting Smartphones. Authentication and its techniques are the most vulnerable to problems, such as traditional, pattern password and PIN code etc. Inaddition, biometric techniques are safer than normal authentication methods. Therefore, these techniques are related to thecharacteristics of human beings and used to authenticate who owns them. Besides, authentication is granted by an Operating SystemOS to protect authentication data onto theft and manipulation. However, local OS s are vulnerable to problems such as hackerattacks, and systems and Multi-trying to enter the device when it stole. On the other hand, the connection to the OS should beavailable when requesting authentication in a Smartphone, otherwise the user will not be able to access his device. In this paper, wediscuss the failure connected to OS in order to obtain authentication, and some cases lead to non-authentication. We are discussingthe user's access to the Smartphone by any biometric devices currently in use. When using of the virtual OS if the OS fails todetermine the real Authorized, by creating a Virtual OS (VOS) on the Smartphone. For example: a user cans only access to hisdevice, when obtain on the Authorized form of VOS. It has the same specifications and environment, as the original OS.
Keywords: Virtual OS, Authentication, Local OS, Semi-Authorized, Smartphone
Edition: Volume 8 Issue 10, October 2019,
Pages: 665 - 668
Similar Articles with Keyword 'Authentication'
Downloads: 5 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021Pages: 174 - 178
Android Notes using Finger Print Authentication
Vaibhav Garg | Siddharth Yadav | Rishabh Kamal
Downloads: 14 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Informative Article, Information Technology, India, Volume 10 Issue 7, July 2021Pages: 63 - 81
Introduction to Cryptography