Enhancing Enterprise Mobile Security with Multi-Profile Biometric Authentication.
Saved in:
| Title: | Enhancing Enterprise Mobile Security with Multi-Profile Biometric Authentication. |
|---|---|
| Authors: | Siok Yee Tan, Yu Chien Lim, Kahwaji, Ali |
| Source: | Grenze International Journal of Engineering & Technology (GIJET); Jan2025, Vol. 11 Issue Part2, p1266-1277, 12p |
| Subject Terms: | SECURITY systems, LEAKS (Disclosure of information), BIOMETRIC identification, DATA integrity, DATABASES |
| Abstract: | In today's ever-changing technological landscape, mobile devices such as phones and tablets play a vital role in storing large amounts of personal and corporate information, making them prime targets for security breaches. In workplaces where shared devices are common, the risk of information leakage increases, especially when relying solely on password protection. To address this challenge, this project introduces Multi-FR Lock, a powerful voice and facial recognition security application designed for Android devices. Unlike traditional facial recognition locks that are limited to authenticating a single user, Multi-FR Lock supports multiple user profiles, allowing for secure device sharing among employees. This application is specifically designed to lock and secure sensitive applications as specified by administrators. To access these locked applications, users must pass facial and voice recognition tests. This duallevel security method significantly improves protection against unauthorized access. Administrators are responsible for recording employee information and managing facial and voice data in a connected database, ensuring that only authorized users can update or modify stored biometric data, thereby maintaining data integrity. Developed on Android Studio and Java, with PHP, HTML, JavaScript, and Firebase for the web-based administration platform, Multi-FR Lock stands out in the field of mobile security solutions. By providing a secure and convenient way to manage access to devices in a shared environment, it offers significant benefits to businesses and organizations looking to prevent information leaks and improve overall security. [ABSTRACT FROM AUTHOR] |
| Copyright of Grenze International Journal of Engineering & Technology (GIJET) is the property of GRENZE Scientific Society and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.) | |
| Database: | Complementary Index |
Be the first to leave a comment!
Nájsť tento článok vo Web of Science