Implicit user verification and privacy protection method based on multi-dimensional behavior characteristics

A privacy protection and user authentication technology, applied in the fields of implicit user authentication and privacy protection based on multi-dimensional behavioral characteristics, privacy user authentication and privacy protection, to achieve the effects of less attack, high security and low latency

Active Publication Date: 2014-01-22
苏州美信互联信息技术有限公司
View PDF3 Cites 40 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to overcome the deficiencies in the prior art, and provide an implicit user verification and privacy protection method based on multi-dimensional behavior characteristics, which has low power consumption, is not easy to be imitated and attacked, and cannot be detected by the user Can carry out accurate user identification and make corresponding privacy protection measures

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Implicit user verification and privacy protection method based on multi-dimensional behavior characteristics
  • Implicit user verification and privacy protection method based on multi-dimensional behavior characteristics
  • Implicit user verification and privacy protection method based on multi-dimensional behavior characteristics

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The present invention will be further described below in conjunction with specific drawings and embodiments.

[0023] Existing passwords are easy to be stolen or facial recognition methods are easy to be imitated, but the behavior patterns of different users using mobile devices, such as the applications they are used to and the location, force, and time of tapping the screen, are quite different and very different. It is difficult to be imitated, so the user's behavior pattern can be used as an invisible password for user authentication. For current touch-screen smart devices, such as mobile phones, when the user touches the screen of the mobile device, the device usually causes slight changes in position and posture. Since most of the current smart devices integrate motion sensors, these tiny responses to touch can be well reflected from the sensor data, and the responses of mobile phones usually have different characteristics during use by different users. In additi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an implicit user verification and privacy protection method based on multi-dimensional behavior characteristics. The method comprises the steps as follows: a, data of mobile equipment operation behaviors of a legitimate user is collected; b, a legitimate user operation characteristic model is established; c, a support vector machine is utilized for comparing current behavior characteristic vector with the legitimate user operation characteristic model, so that an operation comparing conclusion about whether a current user is legitimate is obtained, and the confidence level of the operation comparing conclusion is obtained; and d, probability that the current user is legitimate is calculated by a confidence level algorithm according to the current behavior characteristic vector and the confidence level, when the probability of the legitimate user is higher than a set threshold value, the current user is confirmed to be legitimate, otherwise, mobile equipment starts a privacy protection protocol which is set in advance. According to the implicit user verification and privacy protection method based on the multi-dimensional behavior characteristics, the power consumption is low, the probability of simulation and attack is low, accurate user identity recognition can be performed under the condition that the user cannot perceive, and a corresponding privacy protective measure is taken.

Description

technical field [0001] The invention relates to a privacy user verification and privacy protection method, in particular to an implicit user verification and privacy protection method based on multi-dimensional behavior characteristics, belonging to the technical field of privacy protection. Background technique [0002] With the development of modern information technology, people have become more and more dependent on various mobile devices, such as mobile phones, tablet computers, etc. to send and receive emails, share photos, conduct online transactions, and even smart homes. However, these complex functions will bring some hidden dangers about security and privacy leakage. Although these mobile devices have become more and more personal, many users are still willing to lend their devices to others, such as family members, friends, colleagues, etc., as long as sensitive personal information is not leaked. On the other hand, in order not to show distrust of the other par...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W12/122
CPCY02D30/70
Inventor 波澄张兰李向阳
Owner 苏州美信互联信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products