Smart phone user identity authentication method based on gyroscope behavior characteristics

A user identity authentication and smart phone technology, applied in the field of smart phone user identity authentication using mobile phone sensor data, can solve the problems of touch screen traces and finger movement guessing attacks, easy to be forgotten or stolen, etc., to achieve extensive security and applicability, easy large-scale promotion, and simple operation

Active Publication Date: 2015-03-11
XI AN JIAOTONG UNIV
View PDF3 Cites 48 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For the way of PIN password, it is easy to realize and simple and convenient, but it is easy to be forgotten or stolen; Memory, but touch screen traces and fing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Smart phone user identity authentication method based on gyroscope behavior characteristics
  • Smart phone user identity authentication method based on gyroscope behavior characteristics
  • Smart phone user identity authentication method based on gyroscope behavior characteristics

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] see figure 1 , a smart phone user identity authentication method based on gyroscope behavior characteristics, which can be used to authenticate the legality of the operator of the touch screen device, and realize the security protection of personal and sensitive information stored inside the touch screen device. The present invention includes two parts of identity authentication model training and operator identity authentication, and the specific implementation steps are as follows:

[0035] 1) The identity authentication model training part includes the following steps:

[0036] (1) The gyroscope collects and records the gyroscope behavior data during the user's multiple clicks and slide operations (touch screen operations) at a fixed touch screen position to obtain a training data set; the format of the gyroscope behavior data is: {horizontal direction Angular velocity in the right direction (X axis), angular velocity in the vertical upward direction (Y axis), angul...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a smart phone user identity authentication method based on gyroscope behavior characteristics. The method comprises the following steps: extracting sensor behavior data corresponding to different operation events according to time information of screen touch operation by analyzing gyroscope behavior data generated during screen touch operation of a smart phone user to generate sensor behavior characteristics; establishing an identity authentication model of the user based on the behavior characteristics; performing identity authentication on the smart phone user. The method disclosed by the invention has the advantages that the method is easy to operate, and any additional equipment does not need to be added; the behavior characteristics of the mobile phone user in an authentication process are described by using gyroscope operation behaviors on the basis of not changing the user habit to lay a basis for user identity judgment, so that smear attack and observation attack can be effectively prevented, and extensive safety and adaptability are achieved.

Description

technical field [0001] The invention relates to smart phone user identity authentication, in particular to a smart phone user identity authentication method utilizing mobile phone sensor data. Background technique [0002] With the rapid development of the mobile Internet, smart phones have penetrated into all walks of life, affecting every detail of people's life and work. Smartphones record and store more and more important data (such as account passwords) and private information (such as text messages and videos) of mobile users. Especially in recent years, the extensive use of mobile payment-related applications and the frequent occurrence of privacy leakage incidents have made people pay more and more attention to the security protection of smart phones. [0003] Safe and effective identity authentication is the core issue of smart phone security protection. It refers to the process that the system confirms whether the user's identity is legal when the user accesses th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/31G06F3/01
CPCG06F21/316
Inventor 沈超蔡忠闽左幸存余天文管晓宏
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products