Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An event-triggered implicit authentication method based on mobile devices

A mobile device and identity verification technology, applied in the field of information security, can solve problems such as being easily affected by objective factors, a large amount of user data, and low verification efficiency

Active Publication Date: 2019-08-09
陕西尚品信息科技有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention proposes an implicit identity verification method based on a trigger event triggered by a mobile device. Through the trigger event trigger technology and the segmented weighted moving average technology, the existing implicit identity verification method needs a large amount of user data and the verification efficiency is low. , easily affected by objective factors and other issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An event-triggered implicit authentication method based on mobile devices
  • An event-triggered implicit authentication method based on mobile devices
  • An event-triggered implicit authentication method based on mobile devices

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] refer to figure 1 According to the present invention, a mobile device-based trigger event triggers an implicit identity verification method. The specific steps are as follows:

[0043] In order to illustrate the specific implementation of the present invention more clearly, first, necessary explanations are given to the concepts of trigger event type, trigger event confidence table, user confidence flow, and decision threshold involved in the present invention.

[0044] The types of triggering events are receiving or sending mobile phone text messages, incoming and outgoing calls, changes in browser browsing history, and changes in WIFI access history. When the trigger event Event occurs, the mobile phone conducts implicit authentication.

[0045] The trigger event confidence table represents the trustworthiness of the trigger event, including SMS statistics, call statistics, web page browsing statistics, and WIFI access statistics. refer to figure 2 , the content o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an event-triggered implicit identity authentication method based on a mobile device. The implementation plan is: set the type of implicit trigger event of the device and the characteristic quantity of each trigger event. When the trigger event occurs, the device obtains the user confidence by comparing the habits of the current user with the habits of legitimate users, and through the history The current judgment threshold is obtained by calculating the user confidence degree and the judgment threshold, and then the legitimacy of the current user is determined by comparing the current user confidence degree and the judgment threshold. The invention solves the problems of inefficient identification of illegal users in the existing implicit identity verification method, requiring a large amount of user data and learning time, and the like.

Description

technical field [0001] The invention belongs to the field of information security, and in particular relates to an event-triggered implicit identity authentication method based on a mobile device. Background technique [0002] Mobile devices are used more and more widely today. It is becoming more and more common for lawbreakers to steal user information through mobile devices, so many methods for protecting mobile device information have emerged. Existing information protection methods fall into two categories: explicit authentication and implicit authentication. Explicit authentication means that every time an application accesses the device or the user operates the device, the device directly requires the current user to prove his or her identity. These proofs often appear in the form of passwords or fingerprints. Implicit authentication means that every time an application accesses the device or the user operates the device, the device automatically judges the user's i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04M1/725H04W12/06H04W12/12
CPCH04W12/06H04W12/12H04M1/72484
Inventor 吴灼添刘涛刘轩刘宇鹏
Owner 陕西尚品信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products