Authentication method of writing behavior characteristics based on wrist-worn electronic devices

A technology of electronic equipment and authentication methods, applied in digital data authentication, electrical digital data processing, instruments, etc., can solve problems such as observation attacks and guessing attacks, theft of unlocking methods, and incomplete security, achieving robustness and The effect of fault tolerance

Active Publication Date: 2020-06-09
RES INST OF XIAN JIAOTONG UNIV & SUZHOU
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the first method is vulnerable to observation attacks and guessing attacks, so that the unlocking method is stolen by the attacker; authentication methods such as fingerprints and iris require special hardware support; and the second method is not completely safe. The person's fingerprint can be recovered on the computer from the photo of the person waving

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method of writing behavior characteristics based on wrist-worn electronic devices
  • Authentication method of writing behavior characteristics based on wrist-worn electronic devices
  • Authentication method of writing behavior characteristics based on wrist-worn electronic devices

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] see figure 1 , the present invention is based on a writing behavior feature authentication method of a wrist-worn electronic device, which can be used to unlock the electronic device and realize the security protection of the electronic device or entity (such as a safe). The present invention includes two parts of user identity model construction and user identity authentication, and the specific implementation steps are as follows:

[0059] S1. The user identity model construction part includes the following steps:

[0060] S1.1. When the user first starts training the system, let the user write the same word, Chinese character, signature or pattern with the same habit, and use the accelerometer and gyroscope to collect and record the user's writing data to form an identity model construction The required writing behavior training data set; the format of the writing data is: {time, x-axis acceleration, y-axis acceleration, z-axis acceleration, x-axis angular velocity,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a writing behavior feature authentication method based on a wrist-worn electronic device, which analyzes the user's writing behavior, extracts writing features and finds features with significant discrimination according to acceleration and angular velocity data obtained by accelerometers and gyroscopes , using a single classifier for classification judgment. At the same time, the dynamic time series distance (DTW) between the training data is calculated and compared with the input samples, and the above two judgments are combined to determine whether the user is legal. The collection of behavioral data by the method of the present invention is very convenient, and can be completed by picking up a pen and writing when the user wears smart bracelets, smart watches, etc. It can better reflect the user's writing behavior, and significantly improve the robustness and fault tolerance of identity authentication; and this authentication method has been tested for attacks and is difficult to be attacked.

Description

technical field [0001] The invention relates to the field of device security authentication, in particular to a security identity authentication method for wrist-worn electronic device users. Background technique [0002] With the advancement of social informatization and intelligence, more and more personal information (such as text messages, emails, pictures, etc.) and sensitive information (such as bank account numbers, office data, etc.) are stored in electronic devices. In addition, the frequent occurrence of personal privacy information leakage incidents has gradually brought the security protection of electronic equipment into the public's field of vision. At the same time, with the popularity of electronic wearable devices (smart bracelets, smart watches, etc.), we can use them to perform a more convenient identity authentication process. [0003] Existing identity authentication methods for electronic devices mainly include memory passwords (such as digital passwor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/31G06F21/32G06K9/62
CPCG06F21/316G06F21/32G06F18/24147G06F18/2433G06F18/2411G06F18/22
Inventor 沈超陈宇飞王诏吕启管晓宏
Owner RES INST OF XIAN JIAOTONG UNIV & SUZHOU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products