Smart device identity authentication method and client based on touch screen operation

A smart device and identity authentication technology, applied in the field of information security, can solve problems such as failure to take confidentiality measures, high failure rate of training model identity authentication, easy password leakage, etc., to achieve reasonable data standardization process and fast and simple data connection , safety and robustness

Active Publication Date: 2018-03-06
FUJIAN NORMAL UNIV
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although smart devices on the market are basically equipped with a digital password lock function to facilitate user authentication, there are several problems in the following aspects: First, many people choose passwords with low password strength in order to avoid forgetting passwords. According to the survey of four-digit code locks for devices, "0000", "1234" and "2580" have become the top three most popular passwords, accounting for 15% of the total number of people surveyed; secondly, even if a password with a low repetition rate is used, However, the password is easy to reveal. For example, in a crowded bus, if no security measures are taken when unlocking the lock, it is easy to be peeped by people around; Password, these problems make this kind of password lock useless, illegal users can successfully enter the user interface by entering the correct password, and then steal the privacy and confidential files in the user's smart device (such as browsing chat records, copying confidential information, stealing bank accounts) password, etc.)
Although the gyroscope is used to simply detect the distance feature of the user during the touch screen operation and provide an implicit authentication method for touch screen operation, but first of all, the distance feature is only a part of the touch screen operation process, and the simple distance feature is difficult for the user. The touch screen operation is completely detected; secondly, after extracting the behavior feature vector from the gyroscope behavior data, a single classifier is directly used to establish the user’s identity authentication model, and the extracted behavior feature vector is not processed by data standardization. The measured data does not all change according to certain rules. There will always be outliers in the data detected by the gyroscope during the user's use. If these outliers are not processed, the training model will fail to be established or the identity of the distance feature vector High authentication failure rate, which interferes with user touch screen operations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Smart device identity authentication method and client based on touch screen operation
  • Smart device identity authentication method and client based on touch screen operation
  • Smart device identity authentication method and client based on touch screen operation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0091] Please refer to Figure 2 to Figure 6 , Embodiment 1 of the present invention is:

[0092] A smart device identity authentication method and client based on touch screen operation, specifically:

[0093] Install an application program on the client, and the application program authorizes the use of the built-in sensor of the client;

[0094] The client uses the built-in pressure sensor, gyroscope sensor, acceleration sensor, and direction sensor to collect user behavior data during multiple touch screen operations;

[0095] Decompose each touch screen operation into three stages: press down time, hold time, and lift-off time, among which

[0096] Press down time refers to the time from when the smart device receives the applied external force to when the external force reaches its peak value;

[0097] Holding time refers to the duration of receiving the peak external force from the smart device;

[0098] Lift-off time refers to the time from when the smart device re...

Embodiment 2

[0142] Please refer to Figure 7 to Figure 11 , the second embodiment of the present invention is:

[0143] The client's password is a digital password lock, Figure 7 It is the numeric keypad interface of the client screen. When establishing the touch screen area sub-feature of user touch screen operation, user touch screen gestures are divided into the following five gestures:

[0144] The first gesture: hold the device with the left hand, and touch the screen with the left thumb;

[0145] The second gesture: Hold the device with your right hand, and touch the screen with your right thumb;

[0146] The third gesture: hold the device with the left and right hands, and operate the touch screen with the left and right thumbs;

[0147] The fourth gesture: hold the device with the left hand, and touch the screen with the index finger of the right hand;

[0148] The fifth gesture: hold the device with the right hand, and touch the screen with the index finger of the left hand;...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a smart device identity authentication method based on touch screen operation and a client terminal, which improves the security of password input authentication. The present invention collects and records the user's behavior data during multiple touch screen operations; extracts the behavioral characteristics of the behavior data during multiple touch screen operations, and establishes behavioral feature vectors for multiple touch screen operations; The behavior feature vector of the operation is normalized and a classifier is constructed; the classifier is stored and sent to the cloud for storage; the behavior data of the user during a single touch screen operation is collected and recorded; the single touch screen operation process is extracted Behavior characteristics of the behavior data in the data, and establish the behavior feature vector of a single touch screen operation; normalize the behavior feature vector of the single touch screen operation; The behavior feature vector of touch screen operation realizes the implicit authentication of password input.

Description

technical field [0001] The invention belongs to the field of information security, and in particular relates to a touch screen operation-based smart device identity authentication method and a client. Background technique [0002] Smart devices have become ubiquitous personal devices. The usage coverage rate of smart devices in the United States has reached 89%, and sales continue to rise. Smart devices are convenient for users to chat online, transfer files, trade and shop anytime, anywhere. A large amount of sensitive private information is stored in smart devices, which brings great security risks to users, because smart devices contain many important private information, such as confidential Files, logins, contacts, etc. In addition, as a portable device, a smart device is more likely to be lost or stolen than a typical desktop electronic device. Therefore, how to ensure that private information is not stolen by illegal users is the focus of research by smart device d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/31G06F3/041H04L29/06
Inventor 陈志德吴纪芸郑金花黄欣沂伍玮
Owner FUJIAN NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products