Method for continuous authentication by mobile equipment in mobile communication system

A technology for mobile communication systems and mobile devices, which is applied in the field of continuous authentication of mobile devices in mobile communication systems, and can solve problems such as insufficient protection and forgetting to turn off mobile devices

Active Publication Date: 2009-03-11
SPREADTRUM COMM (SHANGHAI) CO LTD
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But sometimes such protection is not enough, there are very important data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for continuous authentication by mobile equipment in mobile communication system
  • Method for continuous authentication by mobile equipment in mobile communication system
  • Method for continuous authentication by mobile equipment in mobile communication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In order to understand the technical content of the present invention more clearly, the following examples are given in detail.

[0040] see figure 1 As shown, the method for continuous authentication of mobile devices in the mobile communication system includes several biometric authentication function modules set on the mobile device. The device of biometric feature collection and authentication function, wherein, described method comprises the following steps:

[0041] (1) Establish a part of the observable Markov decision process system model according to the continuous authentication process, and determine the information state space of the system model and the information state of the system at each discrete time point, including the following steps:

[0042] (a) Determine the information state π of the system model according to the following formula k :

[0043] π k (i)=P(X k =e i |Y(k)), i=1, 2, ..., S,

[0044] 1 S ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for continuously authenticating mobile equipment in a mobile communication system. The steps are as follows: a system module which can be partially observed in the Markov decision process is built, the information states of information state space and each discrete time point are defined, a cumulative cost model is built, the corresponding relation between the information states and an optimal biological specificity authentication functional module is calculated, the optimal biological specificity authentication functional module is obtained on the basis of historical information, the next authentication is dispatched to perform, the information output at the next time point is observed, the information state of the system is updated and hereby, the authentication result is judged. The method for continuously authenticating mobile equipment in the mobile communication system ensures the optimization of the performance of the system, greatly improves the security of the mobile equipment, satisfies the requirements of users having very high requirements for the security of the mobile equipment, saves system resources and system operation cost, has stable and reliable working performance, wider application range and lays a strong foundation for the further development of the information safety technique of the mobile equipment.

Description

technical field [0001] The invention relates to the field of information security of mobile communication systems, in particular to the technical field of information security management of mobile equipment in the mobile communication system, and specifically refers to a method for continuous authentication of mobile equipment in the mobile communication system. Background technique [0002] Authentication is used to identify the identity of the user, and one or more identification methods can be used: such as passwords, tokens, and user biometrics. Biometrics are divided into static biometrics and dynamic biometrics, such as fingerprints, retina, etc. It belongs to static biological characteristics, while facial expressions, body movements, etc. belong to dynamic biological characteristics. Password authentication is relatively simple and easy to use. Since there is no direct relationship between the password and the user itself, it cannot be sure that the person who enters...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04Q7/32G06K9/00
Inventor 于非张霞
Owner SPREADTRUM COMM (SHANGHAI) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products