System and method for customer authentication execution based on customer behavior mode

A user authentication and mode technology, which is applied in the direction of user identity/authority verification, radio/induction link selection arrangement, selection device, etc., which can solve the problem of increasing the overall cost of the biometric system.

Inactive Publication Date: 2009-02-11
财团法人SEOUL大学校产学协力财团
View PDF0 Cites 42 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, in order to improve the accuracy of identification,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for customer authentication execution based on customer behavior mode
  • System and method for customer authentication execution based on customer behavior mode
  • System and method for customer authentication execution based on customer behavior mode

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In the following description, numerous specific details are set forth. It may be apparent, however, that these embodiments may be practiced without some or all of these specific details. In other instances, well-known procedures, operations or elements have not been described in detail so as not to obscure the invention.

[0027] The present invention relates to a system and method for performing user authentication based on behavior patterns of mobile terminal users. In one embodiment, the system includes a mobile terminal having an input unit for receiving authentication information from a user, an authentication unit for extracting a behavior pattern of the user based on the authentication information, And a data communication unit, the data communication unit is used to transmit the authentication information and the behavior pattern to the authentication server. The input unit of the mobile terminal may include one or more input devices such as key pads, motion s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a system and a method for executing the user authentication based on the behavioral pattern of a mobile terminal user. The system comprises a mobile terminal; the mobile terminal is provided with an input unit used for receiving the authentication information from the users; an authentication unit for extracting the users' behavioral pattern based on the authentication information; and a data communication unit for sending the authentication information and the behavioral pattern to an authentication server. The behavioral pattern based on the extracted authentication information includes the user characteristic behavioral patterns, such as a typing pattern, a mobile pattern, a sound pattern and a writing pattern. The system and the method for executing the user authentication based on the behavioral pattern of the mobile terminal user can improve the security and the flexibility of the user authentication system.

Description

technical field [0001] The present invention generally relates to a system and method for performing user authentication based on user behavior patterns, and more particularly to a method for performing user authentication based on information such as a user's movement and A system and method for performing user authentication based on user behavior patterns such as typing patterns, thereby improving the security and flexibility of the user authentication system. Background technique [0002] In electronic commerce such as Internet-based online banking, securities trading, and accounting services, a user authentication process is required to verify a user's claimed identity. In general, the user authentication process is performed by comparing ID and password input by the user with ID and password registered in a database of an authentication system (for example, template ID and password). Although this password method is widely used because it is the simplest and cheapest ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04Q7/32H04Q7/38H04L9/32
Inventor 赵成埈张民
Owner 财团法人SEOUL大学校产学协力财团
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products