Fig. 4From: Secure user authentication based on the trusted platform for mobile devicesSecure user authentication procedureBack to article page