6533b826fe1ef96bd1283b7d

RESEARCH PRODUCT

An integrated identity verification system for mobile terminals

Oleksiy MazhelisJari VeijalainenJouni Markkula

subject

High-level verificationFunctional verificationComputer sciencebusiness.industryRuntime verificationLibrary and Information SciencesManagement Science and Operations ResearchManagement Information SystemsIntelligent verificationEmbedded systemSystems architectureIdentity (object-oriented programming)VerificationBusiness and International ManagementbusinessSoftware verification

description

PurposeTo report the work on the design of an integrated identity verification system architecture aimed at approaching high verification accuracy, continuous security, and user‐friendliness.Design/methodology/approachThe reported research corresponds to the building process in the design science research paradigm. The requirements to an identity verification system are defined and used in the selection of architecture components. Furthermore, various issues affecting the suitability of component distribution between a terminal and a remote server are considered.FindingsIn order to meet the stated requirements, in the proposed architecture static and dynamic identity verification is combined. The use of the dynamic part enables continuous and user‐friendly verification, while the static part is responsible for accurate verification. A suitable distribution of architecture components between the terminal and the remote server is proposed.Research limitations/implicationsThe proposed architecture represents a specification that corresponds to the computational viewpoint of the reference model for open distributed processing. Other specifications, such as engineering or technological specifications, which are needed for successful implementation of the system, are not provided in the paper.Practical implicationsThe paper provides a specification of the integrated identify verification system architecture that can be utilised during further design and subsequent implementation of the system.Originality/valueWhile available approaches to identity verification in a mobile environment concentrate mainly on connectivity identity verification (employed in accessing communication services), the proposed architecture focuses on application‐level identity verification needed to access application‐level resources, remotely or locally on the terminal.

https://doi.org/10.1108/09685220510627269