Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for the behavior-based authentication of a user

A user-behavioral technology, applied in the fields of digital data authentication, character and pattern recognition, unauthorized/fraudulent phone call prevention, etc., can solve the problem of low security, fingerprint sensor can no longer identify users, and users are difficult to remember. Living and other issues to achieve the effect of improving safety

Active Publication Date: 2019-10-25
NEXENIO GMBH
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Given the many PIN-protected devices and applications users use throughout the day and the many PINs to remember associated with it, it is easy for users to forget their PINs
Usually free-chosen passwords are either too short to be easy to remember, but this has the disadvantage that they can be guessed quickly and therefore provide only low security
In contrast, passwords that provide a high level of security are often long and complex, making them difficult for users to remember
The disadvantage of the fingerprint sensor is that the user must additionally place a predetermined finger on it
If he is holding the mobile portable communication system in the wrong hand, the fingerprint sensor can often no longer recognize the user
There are also many situations where the fingerprint sensor does not work correctly, like for example if the user's fingers are dirty or wet, not to mention when the user is wearing gloves

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for the behavior-based authentication of a user
  • Method and system for the behavior-based authentication of a user
  • Method and system for the behavior-based authentication of a user

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0120] Mutually corresponding components of the following embodiments are denoted by the same reference numerals.

[0121] figure 1 The schematic structure of an embodiment of a mobile portable communication system 100 is shown, which is carried by the user 1 . In this embodiment, the mobile portable communication system has a single mobile portable communication device 102 . The mobile portable communication device 102 is adapted to perform a method for behavior-based authentication of the user 1 with respect to the mobile portable communication system 100 . The mobile portable communication device 102 has a sensor 110 which is suitable for measuring gross motor movements of the user 1 as measurement data 500 . Furthermore, the mobile portable communication device 102 has a large motion classification module 200 adapted to process the measurement data 500 of the sensor 110 . The mobile portable communication device 102 also has a memory 120 in which the measurement data 50...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for the behavior-based authentication of a current user (1) to a mobile, portable communication system (100). Said communication system has at least one sensor (110)for capturing gross-motor measurement data (500), a gross-motor classification module (200), a processor (130), and an internal memory (120). The sensor (110) is designed to capture gross-motor measurement data (500) of a gross-motor movement of a current user (1) of the mobile, portable communication system (100). The gross-motor classification module (200) is configured for classification of thegross-motor measurement data (500) and trained for recognition of a gross-motor movement of a registered user. The method for the behavior-based authentication (400) of the current user (1) to a mobile, portable communication system (100) has the following steps: repeated performance of the following steps: capturing the gross-motor measurement data (500), inputting the gross-motor measurement data (500) into the gross-motor classification module (200), generating a first classification result (600), storing the first classification result (600), accessing the memory (120) of the mobile, portable communication system (100) in order to read out at least one of the stored first classification results (600) from the memory (120), reading out the at least one first classification result (600)and evaluating same in accordance with a specified checking criterion (800), producing an authentication signal (710) if the checking criterion (800) is met.

Description

technical field [0001] The present invention relates to a method and system for behavior-based authentication of a user against a mobile portable communication system. Background technique [0002] Mobile portable communication systems are closely integrated into human's daily work and are indispensable. In order to gain access to such systems, a user typically must be authenticated by a personal identification number (PIN), password or perhaps fingerprint. Given the many PIN-protected devices and applications a user uses throughout the day and the many PINs to remember associated with it, it is easy for a user to forget a PIN. Usually freely selectable passwords are either too short to be easy to remember, but this has the disadvantage that they can be guessed quickly and thus provide only low security. In contrast, passwords that provide a high level of security are often long and complex, making them difficult for users to remember. A disadvantage of the fingerprint se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/32G06F21/31G06K9/00
CPCG06F21/316G06F21/32G06V40/20H04M1/67G06F18/2431
Inventor M·佩施克M·施恩亚肯P·伯格尔P·亨尼格
Owner NEXENIO GMBH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products