Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Mobile terminal user identity authentication method based on multi-finger touch behavior characteristics

An authentication method and multi-finger touch technology, applied in the field of mobile terminal user identity authentication, can solve the problems of high cost, easy forgetting of passwords, inapplicability and no related equipment, etc., and achieve the effect of reduced success rate and good security.

Active Publication Date: 2015-11-18
XI AN JIAOTONG UNIV
View PDF4 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The current mainstream authentication methods based on passwords and passwords need to be memorized by users, passwords are easy to forget, and cannot solve the problem of stolen account numbers and passwords; methods based on physical authentication devices such as ID cards and tokens need to carry physical media with them, and they are also It is easy to be stolen or copied; although the authentication method based on physiological characteristics such as fingerprints and irises has high security, it requires special hardware equipment to complete the authentication, which is costly and not suitable for a large number of existing systems without related equipment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile terminal user identity authentication method based on multi-finger touch behavior characteristics
  • Mobile terminal user identity authentication method based on multi-finger touch behavior characteristics
  • Mobile terminal user identity authentication method based on multi-finger touch behavior characteristics

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] An intelligent mobile terminal authentication method based on multi-finger touch behavior characteristics, comprising:

[0026] (1) Obtain the user's touch screen operation information through multi-finger touch screen operation, wherein the multi-finger touch screen operation is the touch screen sliding of multiple fingers in a close state;

[0027] (2) Extract the physiological and behavioral features of the touch screen from the user's touch screen operation information, and combine the above features into a feature vector, the physiological feature is the relative distance of the touch point at each moment; the behavioral feature includes describing different trajectories The pattern of time-dependent velocity, acceleration, pressure and contact area is described;

[0028] (3) utilize the eigenvector of described merging to carry out training to probabilistic neural network classifier and support vector machine classifier, generate the training model of legal user; ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a smart mobile terminal authentication method based on multi-finger touch behavior characteristics. The method comprises a first step of obtaining touch screen operating information of a user through multi-finger touch screen operation, the multi-finger touch screen operation being touch screen sliding of multiple fingers at a together-put state; a second step of extracting a physiological feature and a behavior feather of a touch screen from the user touch screen operation information, and combining the above feathers as one feature vector; a third step of training a probabilistic neural network classifier and a support vector machine classifier by using the above combined feather vector, to generate a training model of valid users; and a fourth step of collecting touch screen operation information of test users, processing the information according to the second step to obtain combined feature vectors of the touch screen operation of the test users, and putting the combined feature vectors into the two classifiers to compare with the training model of the valid users, thus to obtain classifying results if the test users are valid users.

Description

technical field [0001] The invention relates to user identity authentication technology, in particular to a mobile terminal user identity authentication method. Background technique [0002] With the advent of the information age and the increasing popularity of network technology, people rely more and more on various electronic devices to complete daily work, study and various affairs in life. It greatly improves the convenience of using information technology. Obviously, under such circumstances, information security, especially information security on mobile terminals has become an important and urgent problem to be solved. [0003] Identity authentication on smart mobile terminals is a vital part of protecting personal information security. The current mainstream authentication methods based on passwords and passwords need to be memorized by users, passwords are easy to forget, and cannot solve the problem of stolen account numbers and passwords; methods based on physi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F3/0488G06F21/31
Inventor 王必成陈通贾鹏陈旸左一凡洪婉诗任航
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products