Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A continuous identity authentication method for mobile devices to collect user motion behavior

A technology of user identity authentication and user movement, which is applied in the field of continuous identity authentication in which mobile devices collect user movement behaviors. It can solve the problems of users being easily peeped, user privacy leakage, and large power consumption, etc., to overcome the single authentication period. Long-term, the effect of overcoming privacy leakage

Active Publication Date: 2021-09-03
XIDIAN UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of this method is that the user is easily peeped and imitated when swiping the screen. Once the user swipes the screen and is successfully imitated, the identity authentication mechanism will fail.
But, the weak point of this method is: this method needs to often open GPS sensor in the process of collecting GPS location information data, and power consumption is bigger; When collecting browser browsing record, must obtain the Root permission of mobile device; The method needs to transmit highly private data such as user application usage records, browser browsing records, and GPS geographic location information to a remote server for calculation
Once the remote server is compromised, it will cause serious user privacy leakage; this method can only authenticate the user's identity every 30 minutes, and the single authentication period is too long

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A continuous identity authentication method for mobile devices to collect user motion behavior
  • A continuous identity authentication method for mobile devices to collect user motion behavior

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] Attached below figure 1 The specific steps of the present invention are further described.

[0043] Step 1: Use the data collection method to collect the motion behavior data of the user to be authenticated.

[0044] The concrete steps of described data acquisition method:

[0045] Step 1: Use the default accelerometer sampling period in the mobile device to collect behavioral acceleration data of the user to be authenticated during exercise.

[0046] Step 2: Use the default gyroscope sampling period in the mobile device to collect behavioral angular velocity data during the motion of the user to be authenticated.

[0047] In the third step, the acceleration data and the angular velocity data are combined to form the user's motion behavior data.

[0048] Step 2, synchronizing the user's sports behavior data.

[0049] The accelerometer and gyroscope in the mobile device respectively describe the acceleration dimension and the angular velocity dimension of the same us...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a continuous identity authentication method for mobile equipment to collect user motion behaviors, the steps of which are: (1) collecting user motion behavior data; (2) synchronizing user motion behavior data; (3) generating time-domain data block sets; (4) Generate a frequency domain data block set; (5) Build a user identity authentication model; (6) Obtain the time domain behavior detection value; (7) Obtain the frequency domain behavior detection value; (8) Determine the type of behavior; (9) Determine user identity. The present invention overcomes the problem that the user behavior collected by the prior art is easy to be imitated and the prior art collects the user behavior data with high energy consumption, difficult data collection, low privacy protection and long single authentication period, making the present invention secure The advantages of security, practicality, privacy and convenience.

Description

technical field [0001] The invention belongs to the field of information technology, and further relates to a continuous identity authentication method for mobile equipment to collect user motion behavior in the field of information security technology. The invention realizes the continuous authentication of the user's identity through the user's motion behaviors such as running and jumping collected by the mobile device. Background technique [0002] The continuous identity authentication method is based on the user's unique behavioral characteristics and cognitive characteristics. By continuously collecting and evaluating user authentication information, it aims to authenticate the user's identity without interfering with the user's normal behavior. Mobile devices contain a variety of sensors that can continuously collect user behavior and cognitive feature data, and build a continuous identity model for users based on the uniqueness of user behavior and cognitive features...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/32
CPCG06F21/32
Inventor 庞晓健杨力王慧莅马卓茹张程辉王焱济王佳雪
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products