{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T18:01:36Z","timestamp":1754157696174,"version":"3.41.2"},"reference-count":18,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[2005,12,1]],"date-time":"2005-12-01T00:00:00Z","timestamp":1133395200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005,12,1]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>To report the work on the design of an integrated identity verification system architecture aimed at approaching high verification accuracy, continuous security, and user\u2010friendliness.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>The reported research corresponds to the building process in the design science research paradigm. The requirements to an identity verification system are defined and used in the selection of architecture components. Furthermore, various issues affecting the suitability of component distribution between a terminal and a remote server are considered.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>In order to meet the stated requirements, in the proposed architecture static and dynamic identity verification is combined. The use of the dynamic part enables continuous and user\u2010friendly verification, while the static part is responsible for accurate verification. A suitable distribution of architecture components between the terminal and the remote server is proposed.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Research limitations\/implications<\/jats:title><jats:p>The proposed architecture represents a specification that corresponds to the computational viewpoint of the reference model for open distributed processing. Other specifications, such as engineering or technological specifications, which are needed for successful implementation of the system, are not provided in the paper.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title><jats:p>The paper provides a specification of the integrated identify verification system architecture that can be utilised during further design and subsequent implementation of the system.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>While available approaches to identity verification in a mobile environment concentrate mainly on connectivity identity verification (employed in accessing communication services), the proposed architecture focuses on application\u2010level identity verification needed to access application\u2010level resources, remotely or locally on the terminal.<\/jats:p><\/jats:sec>","DOI":"10.1108\/09685220510627269","type":"journal-article","created":{"date-parts":[[2007,1,15]],"date-time":"2007-01-15T18:51:31Z","timestamp":1168887091000},"page":"367-378","source":"Crossref","is-referenced-by-count":4,"title":["An integrated identity verification system for mobile terminals"],"prefix":"10.1108","volume":"13","author":[{"given":"Oleksiy","family":"Mazhelis","sequence":"first","affiliation":[]},{"given":"Jouni","family":"Markkula","sequence":"additional","affiliation":[]},{"given":"Jari","family":"Veijalainen","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022031219520949500_b1","unstructured":"Anderson, J. (1980), \u201cComputer security threat monitoring and surveillance\u201d, Technical Report, James P. Anderson Co., Fort Washington, PA."},{"key":"key2022031219520949500_b2","unstructured":"Bass, L., Clements, P. and Kazman, R. (1999), Software Architecture in Practice, Addison\u2010Wesley, Reading, MA."},{"key":"key2022031219520949500_b3","unstructured":"Buschmann, F., Meunier, R., Rohnert, H., Sommerland, P. and Stal, M. (1996), Pattern\u2010oriented Software Architecture. A System of Patterns, Wiley, New York, NY."},{"key":"key2022031219520949500_b4","doi-asserted-by":"crossref","unstructured":"Clarke, N.L., Furnell, S.M., Reynolds, P.L. and Rodwell, P.M. (2002), \u201cAdvanced subscriber authentication approaches for third generation mobile systems\u201d, Proceedings of the Third International Conference on 3G Mobile Communication Technologies, London.","DOI":"10.1049\/cp:20020412"},{"key":"key2022031219520949500_b5","doi-asserted-by":"crossref","unstructured":"Furnell, S.M. and Dowland, P.S. (2000), \u201cA conceptual architecture for real\u2010time intrusion monitoring\u201d, Information Management & Computer Security, Vol. 8 No. 2, pp. 65\u201074.","DOI":"10.1108\/09685220010321317"},{"key":"key2022031219520949500_b6","unstructured":"ISO\/IEC 7498\u20102 (1989), Information Processing Systems \u2013 Open Systems Interconnection \u2013 Basic Reference Model \u2013 Part 2: Security Architecture, Equivalent to ITU\u2010T Rec. X800, International Organization for Standardization, Geneva."},{"key":"key2022031219520949500_b7","unstructured":"ISO\/IEC 10746 (1998), Reference Model for Open Distributed Processing (RM\u2010ODP) \u2013 Part 1\u20104, International Organization for Standardization, Rec. ISO\/IEC 10746\u20101 to 10746\u20104, ITU\u2010T X.901 to X.904, International Organization for Standardization, Geneva."},{"key":"key2022031219520949500_b8","unstructured":"Kumar, S. (1995), \u201cClassification and detection of computer intrusions\u201d, PhD thesis, Purdue University, West Lafayette, IN."},{"key":"key2022031219520949500_b9","doi-asserted-by":"crossref","unstructured":"Leggett, J., Williams, G., Usnick, M. and Longnecker, M. (1991), \u201cDynamic identity verification via keystroke characteristics\u201d, International Journal of Man\u2010Machine Studies, Vol. 35 No. 6, pp. 859\u201070.","DOI":"10.1016\/S0020-7373(05)80165-8"},{"key":"key2022031219520949500_b10","unstructured":"Mazhelis, O. and Markkula, J. (2004), \u201cAn integrated identity verification system for mobile terminals: requirements and architecture components\u201d, Multikonferenz Wirtschaftsinformatik MKWI 2004, Techniques and Applications for Mobile Commerce (TAMoCO), Vol. 3, Essen."},{"key":"key2022031219520949500_b11","doi-asserted-by":"crossref","unstructured":"Mazhelis, O., Seleznyov, A. and Puuronen, S. (2002), \u201cA multi\u2010expert based approach to continuous authentication of mobile\u2010device users\u201d, paper presented at International Workshop on Certification and Security in E\u2010Services, Montreal.","DOI":"10.1007\/978-0-387-35696-9_9"},{"key":"key2022031219520949500_b12","unstructured":"Nokia (2002), Mobile Internet Technical Architecture, MITA, Edita, Helsinki."},{"key":"key2022031219520949500_b13","unstructured":"Pointsec Mobile Technologies (2003), \u201cStolen PDAs provide open door to corporate networks\u201d, Pointsec News Letter, Vol. 3, available at: www.pointsec.com\/news\/news_pressroom.asp (accessed 23 September 2004)."},{"key":"key2022031219520949500_b14","unstructured":"Pointsec Mobile Technologies (2004), \u201cHalf of all corporate PDAs unprotected despite employer risk\u201d, Pointsec News Letter, Vol. 2, available at: www.pointsec.com\/news\/news_pressroom.asp (accessed 23 September 2004)."},{"key":"key2022031219520949500_b15","doi-asserted-by":"crossref","unstructured":"Ross, A. and Jain, A. (2003), \u201cInformation fusion in biometrics\u201d, Pattern Recognition Letters, Vol. 24 No. 13, pp. 2115\u201025.","DOI":"10.1016\/S0167-8655(03)00079-5"},{"key":"key2022031219520949500_b16","doi-asserted-by":"crossref","unstructured":"Tang, J., Terziyan, V. and Veijalainen, J. (2003), \u201cDistributed PIN verification scheme for improving security of mobile devices\u201d, Mobile Networks and Applications (MONET), Vol. 8 No. 2, pp. 159\u201075.","DOI":"10.1023\/A:1022289231864"},{"key":"key2022031219520949500_b17","unstructured":"Veijalainen, J., Haq, M.A. and Matsumoto, M. (2003), \u201cPrivacy and security considerations for personal trusted devices\u201d, Proceedings of DICOMO'2003, 2003, IPSJ Symposium Series, Hokkaido, pp. 561\u20104."},{"key":"key2022031219520949500_b18","unstructured":"Veijalainen, J., Ojanen, E., Haq, M.A., Vahteala, V\u2010P. and Matsumoto, M. (2004), \u201cEnergy consumption tradeoffs for compressed wireless data at a mobile terminal\u201d, IEICE Transactions, Vol. E87 No. 5."}],"container-title":["Information Management &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/09685220510627269","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685220510627269\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685220510627269\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:08:55Z","timestamp":1753402135000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/13\/5\/367-378\/171802"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,12,1]]},"references-count":18,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2005,12,1]]}},"alternative-id":["10.1108\/09685220510627269"],"URL":"https:\/\/doi.org\/10.1108\/09685220510627269","relation":{},"ISSN":["0968-5227"],"issn-type":[{"type":"print","value":"0968-5227"}],"subject":[],"published":{"date-parts":[[2005,12,1]]}}}