Unlock instant, AI-driven research and patent intelligence for your innovation.

Handheld Device Browsing Behavior Authentication Method and System Based on Multiple Factors

A handheld device and authentication method technology, applied in the field of handheld device browsing behavior authentication methods and systems, can solve problems such as easy to be stolen, affect fingerprint acquisition, short passwords, etc. Effect

Active Publication Date: 2020-11-03
TONGJI UNIV
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since the fingerprint sensor will be affected by the external environment, such as: wet fingers, fingerprint dirt, will affect the normal fingerprint acquisition, therefore, mobile phone manufacturers also retain the mobile terminal password authentication method, so that passwords and fingerprints have Equivalent certified competency
However, because the number of passwords is often short, generally 4 to 6 digits, it is very easy to be stolen, so the handheld device urgently needs a method that can provide continuous authentication to protect the user's handheld device from illegal users for a long time. control

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Handheld Device Browsing Behavior Authentication Method and System Based on Multiple Factors
  • Handheld Device Browsing Behavior Authentication Method and System Based on Multiple Factors
  • Handheld Device Browsing Behavior Authentication Method and System Based on Multiple Factors

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050]Embodiments of the present invention are described below through specific examples, and those skilled in the art can easily understand other advantages and effects of the present invention from the content disclosed in this specification. The present invention can also be implemented or applied through other different specific implementation modes, and various modifications or changes can be made to the details in this specification based on different viewpoints and applications without departing from the spirit of the present invention. It should be noted that, in the case of no conflict, the following embodiments and features in the embodiments can be combined with each other.

[0051] It should be noted that the diagrams provided in the following embodiments are only schematically illustrating the basic ideas of the present invention, and only the components related to the present invention are shown in the diagrams rather than the number, shape and shape of the compon...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a browsing behavior authentication method for a handheld device that integrates multiple factors, including: collecting user data, the user data at least including one or more of the external environment data where the handheld device is located, user operation data, and browsing behavior data combination of species; preprocessing the user data; constructing a training model based on the preprocessed user data; detecting new data to be tested to complete user identification; the present invention analyzes the external environment when using the application in real time Data, the application section that the user is browsing, and the user's touch screen data, obtain the characteristic data required by each sub-model, and conduct behavior authentication. When the authentication result is illegal, immediately freeze the account in use or the entire mobile device. The embezzlement behavior of illegal users is avoided, the security of the handheld device is improved, and the disclosure of private information is avoided.

Description

technical field [0001] The invention relates to the field of mobile communication, in particular to a method and system for authenticating browsing behavior of a handheld device that integrates various factors. Background technique [0002] With the development of mobile hardware and software, handheld devices have gradually become an indispensable tool in people's daily life. In daily life, a large amount of private information is often stored in a handheld device. At the same time, a large number of Internet companies regard the handheld device as a legal symbol of the user's identity. It will be released directly for the user experience. Even when logging in to an account on a traditional PC, authentication and confirmation can be performed on a commonly used device to avoid the need to enter a password. On the one hand, by avoiding the cumbersome steps of frequently inputting the account password, the operation can be simplified, which brings great convenience. Howeve...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/31H04M1/725H04W12/06H04L29/06H04W24/06
CPCH04L63/08H04W12/06H04W24/06H04M1/72445
Inventor 蒋昌俊闫春钢丁志军张亚英陈冬祥
Owner TONGJI UNIV