Writing behavior characteristic authentication method based on wrist wearing electronic equipment

A technology for electronic equipment and authentication methods, applied in the fields of digital data authentication, electrical digital data processing, instruments, etc., can solve the problems of observation attacks and guess attacks, stealing and unlocking methods, not completely safe, etc., and achieves robustness and reliability. The effect of fault tolerance

Active Publication Date: 2017-09-12
RES INST OF XIAN JIAOTONG UNIV & SUZHOU
View PDF8 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the first method is vulnerable to observation attacks and guessing attacks, so that the unlocking method is stolen by the attacker; authentication methods such as fingerprints and iris require special hardware support; and the second method is not completely safe. The person's fingerprint can be recovered on the computer from the photo of the person waving

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Writing behavior characteristic authentication method based on wrist wearing electronic equipment
  • Writing behavior characteristic authentication method based on wrist wearing electronic equipment
  • Writing behavior characteristic authentication method based on wrist wearing electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] see figure 1 , the present invention is based on a writing behavior feature authentication method of a wrist-worn electronic device, which can be used to unlock the electronic device and realize the security protection of the electronic device or entity (such as a safe). The present invention includes two parts of user identity model construction and user identity authentication, and the specific implementation steps are as follows:

[0059] S1. The user identity model construction part includes the following steps:

[0060] S1.1. When the user first starts training the system, let the user write the same word, Chinese character, signature or pattern with the same habit, and use the accelerometer and gyroscope to collect and record the user's writing data to form an identity model construction The required writing behavior training data set; the format of the writing data is: {time, x-axis acceleration, y-axis acceleration, z-axis acceleration, x-axis angular velocity,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a writing behavior characteristic authentication method based on wrist wearing electronic equipment. The writing behavior of a user is analyzed, the characteristics of writing are extracted and the characteristics with obvious distinction degree are found according to accelerated speed data and angular speed data obtained by an accelerograph and a gyroscope, and a single classifier is utilized for carrying out classification judgment. Besides, dynamic time series distance (DTW) between training data is calculated, and the dynamic time series distance is contrasted with an input sample, and the two judgments are synthesized, so that that whether the user is legal or not is determined. According to the method disclosed by the invention, the collection for behavior data is extremely convenient, and the collection for behavior data can be completed after writing when the user wears equipment such as a smart bracelet or a smart watch; and moreover, the stability of an authorization model can be guaranteed by adopting two different methods for modeling and authorization respectively, the writing behavior of the user can be preferably reflected, and the robustness and fault tolerance of identity authentication are obviously improved; and the authentication method is difficult to attack through an attack test.

Description

technical field [0001] The invention relates to the field of device security authentication, in particular to a security identity authentication method for wrist-worn electronic device users. Background technique [0002] With the advancement of social informatization and intelligence, more and more personal information (such as text messages, emails, pictures, etc.) and sensitive information (such as bank account numbers, office data, etc.) are stored in electronic devices. In addition, the frequent occurrence of personal privacy information leakage incidents has gradually brought the security protection of electronic equipment into the public's field of vision. At the same time, with the popularity of electronic wearable devices (smart bracelets, smart watches, etc.), we can use them to perform a more convenient identity authentication process. [0003] Existing identity authentication methods for electronic devices mainly include memory passwords (such as digital passwor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F21/32G06K9/62
CPCG06F21/316G06F21/32G06F18/24147G06F18/2433G06F18/2411G06F18/22
Inventor 沈超陈宇飞王诏吕启管晓宏
Owner RES INST OF XIAN JIAOTONG UNIV & SUZHOU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products