Method for implementing continuous authentication joint intrusion detection by mobile equipment in wireless network

A mobile device, wireless network technology, applied in wireless communication, user identity/authority verification, security devices, etc., can solve the problems of information cannot be shared with each other, cannot be combined and applied wireless terminal equipment, cannot be united, etc.

Active Publication Date: 2011-06-01
SPREADTRUM COMM (SHANGHAI) CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] Although a lot of research work has been done on continuous authentication and intrusion detection, they were studied separately in the previous research work, and could not be combined and applied to wireless terminal equipment, and the respective information of the two could not be shared with each other. In this way, the two processes cannot be combined to obtain better effectiveness

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for implementing continuous authentication joint intrusion detection by mobile equipment in wireless network
  • Method for implementing continuous authentication joint intrusion detection by mobile equipment in wireless network
  • Method for implementing continuous authentication joint intrusion detection by mobile equipment in wireless network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] In order to understand the technical content of the present invention more clearly, the following examples are given in detail.

[0063] Please refer to Fig. 2, the method for implementing continuous authentication and joint intrusion detection by mobile devices in the wireless network includes several biometric authentication function modules arranged on the mobile device, the biometric authentication function modules can be biosensors, Of course, other devices with biometric feature collection and authentication functions can also be used, wherein the method includes the following steps:

[0064] (1) Establish a part of the observable Markov decision process system model according to the continuous authentication process, and determine the information state space of the system model and the information state of the system at each discrete time point, including the following steps:

[0065] (a) Determine the information state π of the system model according to the foll...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for mobile apparatus implementing continuous authentication combined intrusion detection in wireless network, the method comprises: building a Markovian decision process model and determining the information state space and the information state of the discrete time point; building an accumulation cost model and performing restriction scheduling according to the system resource restriction scheduling strategy; calculating the corresponding relationship between the information state and the optimum biology characteristic authentication function module; obtaining the optimum biology characteristic authentication function module and scheduling the next time authentication based on the historical information; observing the next time point output information; updating the information state and judging the authentication result. According to the method of the invention, the performance can be optimized, the safety of the mobile apparatus can be improved, the user requirement with high safety can be satisfied, the system resource and the operation cost can be saved, the working performance is stabilized and reliable, the method has wide application rangeand establishes the hardness foundation for the further development of the information safety technology.

Description

technical field [0001] The present invention relates to the field of mobile communication system information security, in particular to the technical field of information security management of mobile equipment in the mobile communication system, and specifically refers to a method for implementing continuous authentication joint intrusion detection of mobile equipment in a wireless network. Background technique [0002] Authentication is used to identify the identity of the user, and one or more identification methods can be used: such as passwords, tokens, and user biometrics. Biometrics are divided into static biometrics and dynamic biometrics, such as fingerprints, retina, etc. It belongs to static biological characteristics, while facial expressions, body movements, etc. belong to dynamic biological characteristics. Password authentication is relatively simple and easy to use. Since there is no direct relationship between the password and the user itself, it cannot be s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04L9/32H04W12/121
Inventor 于非张霞杨金峰张鑫宁涛
Owner SPREADTRUM COMM (SHANGHAI) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products