The birth of smartphones can be traced back to 1973, when Motorola launched their first phone-the Dynatac 8000X.
We also present the assessment of existing user authentication schemes exhibiting their security and usability issues. This paper surveys various types and ways of authentication, designed and developed primarily to secure the access to smartphones and attempts to clarify correlated buzzwords, with the motivation to assist new researchers in understanding the gist behind those concepts. Moreover, most of the reported authentication solutions were evaluated mainly in terms of accuracy, overlooking a very important aspect-the usability. Several authentication schemes have been proposed over the years however, their presentation might be perplexing to the new researchers to this domain, under the shade of several buzzwords, for example, active, continuous, implicit, static, and transparent, being introduced in academic papers without comprehensive description. User authentication is the first line of defense to prevent unauthorized access to the smartphone. However, on the other side, they also pose security and privacy threats to the users’ stored data. On a positive side, smartphones have improved the quality of life by providing multiple services that users desire, for example, anytime-anywhere computing. Apart from their conventional use, that is, calling and texting, they have also been used to perform multiple security sensitive activities, such as online banking and shopping, social networking, taking pictures, and e-mailing. (Your About Me section can be edited after account creation and can be found under My Profile in the Menu section of the app.Smartphones are the most popular and widespread personal devices.
You should use a personal email address that you check often
To create an account from the initial app setup, just follow the instructions on screen. Creating an account ensures that your personal data is backed up securely, and allows you to access it from any of your compatible mobile devices. When you open the CONTOUR ®DIABETES app for the first time, you will be prompted to create a CONTOUR ™CLOUD account.