Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A continuous identity authentication method for collecting user interaction behaviors by using a mobile terminal

A mobile terminal and identity authentication technology, applied in the information field, can solve the problems of user privacy leakage, users are easy to be peeped, easy to be imitated, etc., and achieve the effect of overcoming privacy leakage

Active Publication Date: 2019-06-21
XIDIAN UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are two shortcomings in this method: first, the user is vulnerable to peeping and imitation when swiping the screen. Once the user swipes the screen and is successfully imitated, the identity authentication will become invalid; The sliding screen feature data is transmitted to the remote server. Once the remote server is compromised, it will also cause serious user privacy leakage.
The disadvantage of this method is that the long-term and short-term computer network algorithm used in this method belongs to the binary classification machine learning algorithm, so the continuous identity authentication model constructed by this method belongs to the binary classification model, and the construction of this model must be based on sufficient Based on legitimate user data and illegal user data
However, in actual situations, the ability to obtain illegal user data is limited, and it is impossible to obtain sufficient illegal user data to train the identity authentication model, thereby reducing the versatility of the continuous identity authentication method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A continuous identity authentication method for collecting user interaction behaviors by using a mobile terminal
  • A continuous identity authentication method for collecting user interaction behaviors by using a mobile terminal
  • A continuous identity authentication method for collecting user interaction behaviors by using a mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The present invention will be further described below in conjunction with the accompanying drawings.

[0041] refer to figure 1 The specific steps for realizing the present invention are further described.

[0042] Step 1. Use the data collection method to collect N consecutive interactive behaviors of the user to be authenticated to obtain a set of interactive behaviors of the user to be authenticated. N is a natural number in the interval [1,20].

[0043] The data collection method is to use a mobile device to take 1 minute as a sampling period to synchronously collect the MAC address data, user status data, and application software name data of all WiFi signals existing in the space where the user to be authenticated is located; The multiple collected MAC addresses form a MAC address list; the MAC address list, user status data, application software name data and sampling time collected in each cycle are arranged in the order of collection time, MAC address list, us...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a continuous identity authentication method based on a mobile terminal interaction behavior. The method comprises the following steps: (1) collecting user interaction behaviordata; (2) fuzzifying user interaction behavior data; (3) constructing WiFi-geographic position mapping table; (4) generating an interaction event set; (5) constructing a user identity authentication model; (6) obtaining an interaction event departure value; (7) judging the type of the interaction event; And (8) judging the user identity. According to the method, the problem that the user behaviorcollected in the prior art is easily simulated and the problems that the energy consumption is high, the data is not easy to collect and the privacy protection intensity is low when the user behaviordata is collected in the prior art are solved, so that the method has the advantages of safety, practicability and privacy.

Description

technical field [0001] The invention belongs to the field of information technology, and further relates to a continuous identity authentication method using a mobile terminal to collect user interaction behavior in the field of information security technology. The invention utilizes the mobile terminal to realize the continuous authentication of the user's identity by collecting the user's behavior of calling, using an application software, and other interactive behaviors. Background technique [0002] The continuous identity authentication method is based on the user's unique behavioral characteristics and cognitive characteristics. By continuously collecting and evaluating user authentication information, it aims to authenticate the user's identity without interfering with the user's normal behavior. At this stage, mobile terminals have powerful computing power and a large number of sensors, which can continuously collect user behavior characteristic data and cognitive ch...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F21/45
Inventor 杨力庞晓健王慧莅刘茂珍马卓茹王焱济王佳雪张程辉
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products