Implicit protection method and system based on multi-sensor data fusion

A data fusion and multi-sensor technology, applied in digital data authentication, electronic digital data processing, instruments, etc., can solve the problems of stealing user account privacy information, limited scope of application, peeping of lock screen passwords, etc.

Active Publication Date: 2019-03-12
PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
View PDF14 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] ①Mobile phone remote attack: By writing malicious apps such as Trojan horses, tricking users into clicking download and running, thereby stealing private information such as user accounts;
[0005] ② Unauthorized use of mobile phones: Mobile phone users may be peeping at the lock screen password due to carelessness. After being taken and unlocked by others, they directly impersonate the user to cheat around in WeChat and other APPs, or browse and spy on private information, etc.
[0006] ③Loss of mobile phone: The mobile phone may be stolen or lost accidentally in life. After the person with bad intentions gets the mobile phone, although he cannot use the mobile phone directly, he can take the mobile phone and leave the scene first to crack the password and other behaviors that violate the privacy of the legal owner of the mobile phone.
At present, the recognition accuracy of this type of method is easily affected by many factors such as the environment, and usually requires the cooperation of traditional explicit authentication methods
At the same time, this type of certification protection method still has problems such as over-reliance on specific sensors and limited scope of application.
[0010] It can be seen that the existing authentication protection methods cannot well deal with various mobile phone out-of-control situations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Implicit protection method and system based on multi-sensor data fusion
  • Implicit protection method and system based on multi-sensor data fusion
  • Implicit protection method and system based on multi-sensor data fusion

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0086] Such as figure 1 As shown, a kind of implicit protection method based on multi-sensor data fusion of the present invention includes:

[0087] Step S101: collect data during the interaction between the user and the mobile phone through multiple sensors for the APP, and divide the data into data related to the user's touch screen operation, data related to behavior, action and posture, and data related to location information according to the type of APP and the state of the mobile phone ;include:

[0088] 1) Get sensor data

[0089] There are many sensors in modern mobile phones, and their sensitivity is constantly improving. When a user usually uses a mobile phone, a large amount of sensor data will be generated, which can directly or indirectly reflect the user's behavioral characteristics. Utilize this feature to collect sensor data from the interaction between the mobile phone and the user to realize the identification of the user's identity. The main sensors use...

Embodiment 2

[0274] Such as Figure 15 As shown, a kind of implicit protection system based on multi-sensor data fusion of the present invention comprises:

[0275] The data collection and division module is used to collect data during the interaction between the user and the mobile phone through multiple sensors facing the APP, and divide the data into data related to the user's touch screen operation, data related to behavior, action and gesture, and data according to the type of APP and the state of the mobile phone. Data related to location information;

[0276] The matching probability and trust coefficient generation module extracts the features of the user's touch-screen operation-related data and behavior-action-gesture-related data, correspondingly generates a touch-screen operation feature library and a behavior, action, and gesture feature library, and calculates the user and mobile phone information based on the extracted features. The matching probability of legal holders; co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an implicit protection method based on multi-sensor data fusion, which comprises the following steps: dividing the data collected by an APP-oriented sensor into user screen touch operation-related data, behavior action posture-related data and position information-related data; generating a screen touch operation feature library, a behavior action posture feature library and a position information library through the data, respectively and correspondingly and further calculating the matching probability and trust coefficient of the user with a legal owner of a mobile phone, respectively; abstracting the obtained trust coefficient and the matching probability as a weak matcher, synthesizing a strong matcher through an AdaBoosting algorithm and further calculating a comprehensive matching probability of the user with the legal owner of the mobile phone; and setting a safety matching threshold according to the type of the APP and performing protective processing according to a comparison result of the comprehensive matching probability with the safety matching threshold. The invention also discloses an implicit protection system based on multi-sensor data fusion. The method and the system in the invention can implicitly identify behaviors of illegal use of the mobile phone without the authorization of the owner and discover the situation that the mobile phone is stolen and out of control timely.

Description

technical field [0001] The invention relates to the technical field of safety protection, in particular to an implicit protection method and system based on multi-sensor data fusion. Background technique [0002] With the rapid development of the mobile Internet, mobile terminals represented by Android phones play an increasingly important role in our daily lives. While mobile phones provide convenience to people, they also store a large amount of personal privacy data such as mobile phone address books, short messages, etc. More importantly, the mobile phone is also tightly bound to the user's personal property, such as online banking APP, Alipay, WeChat payment, etc. This makes once the mobile phone is out of control, it will bring huge risks such as privacy leakage and property loss to users. [0003] Mobile phone out of control can be roughly divided into the following three situations: [0004] ①Mobile phone remote attack: By writing malicious apps such as Trojan hor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04M1/725G06F21/32G06F21/31
CPCG06F21/316G06F21/32H04M1/72403H04M1/72406H04M1/72421H04M1/72454
Inventor 奚琪桂智杰韩洋洋杨喆陈吕洋
Owner PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products