Search Results - authentication

4 Results

Sort By:

  1. Protecting mobile devices from unauthorized access is becoming more than indispensable these days. In particular, mobile devices such as smartphones and tablets are pervasive and store increasingly highly sensitive information about a user (e.g., contacts, usernames, passwords, emails, browser histories, business secrets, health conditions, etc.)....
    Published: 2/13/2025
    Inventor(s): Yimin Chen, Yanchao Zhang
  2. Smart phones are very popular and used by over seven billion people. Each day seven million dollars worth of cell phones is lost or stolen. Without an authentication device, personal data stored on the device can be used for identity theft or the phone can be used for unauthorized purposes. Most authentication systems authenticate a user only once when...
    Published: 2/23/2023
  3. Current portable and wearable devices use fingerprint analysis for secure authentication. The fingerprint pattern systems analyze only the surface morphology of the fingerprint, making it easy for hackers to spoof and bypass authentication. RF signals can collect tissue information beyond the surface of the finger and can provide increased security...
    Published: 2/13/2025
  4. Currently, mobile wireless networks use contention-based protocols because of their simplicity and ability to adapt to changes in network conditions. Unfortunately, these systems lack the ability to prioritize the supply and demand load and changes in topology. This inability can cause variances in or delay of signals that can be important in applications...
    Published: 2/13/2025
    Category(s): Wireless & Networking

Search Inventions

Looking for a technology or invention to commercialize? Arizona State University has more than 300 technologies available for licensing. Start your search here or submit your own invention.