Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for authenticating users based on behavior

A user-behavioral technology, applied in digital data authentication, character and pattern recognition, unauthorized/fraudulent call prevention, etc., can solve problems such as complex, fingerprint sensor cannot work correctly, and users are difficult to remember

Active Publication Date: 2022-05-03
NEXENIO GMBH
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Given the many PIN-protected devices and applications users use throughout the day and the many PINs to remember associated with it, it is easy for users to forget their PINs
Usually free-chosen passwords are either too short to be easy to remember, but this has the disadvantage that they can be guessed quickly and therefore provide only low security
In contrast, passwords that provide a high level of security are often long and complex, making them difficult for users to remember
The disadvantage of the fingerprint sensor is that the user must additionally place a predetermined finger on it
If he is holding the mobile portable communication system in the wrong hand, the fingerprint sensor can often no longer recognize the user
There are also many situations where the fingerprint sensor does not work correctly, like for example if the user's fingers are dirty or wet, not to mention when the user is wearing gloves

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for authenticating users based on behavior
  • Method and system for authenticating users based on behavior
  • Method and system for authenticating users based on behavior

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0120] Mutually corresponding components of the following embodiments are denoted by the same reference numerals.

[0121] figure 1 The schematic structure of an embodiment of a mobile portable communication system 100 is shown, which is carried by the user 1 . In this embodiment, the mobile portable communication system has a single mobile portable communication device 102 . The mobile portable communication device 102 is adapted to perform a method for behavior-based authentication of the user 1 with respect to the mobile portable communication system 100 . The mobile portable communication device 102 has a sensor 110 which is suitable for measuring gross motor movements of the user 1 as measurement data 500 . Furthermore, the mobile portable communication device 102 has a large motion classification module 200 adapted to process the measurement data 500 of the sensor 110 . The mobile portable communication device 102 also has a memory 120 in which the measurement data 50...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method based on the behavior of a current user (1) authenticated against a mobile portable communication system (100) having at least one sensor (110) for obtaining macromotion measurement data (500), a macromotion classification module (200) ), processor (130) and internal memory (120). The sensor (110) is designed to obtain gross motor measurement data (500) of gross motor movements of a current user (1) of the mobile portable communication system (100). The gross motor classification module (200) is configured to classify the gross motor measurement data (500) and is trained to recognize gross motor movements of a registered user. The method for behavior-based authentication (400) of a current user (1) with respect to a mobile portable communication system (100) has the following method steps: - Repeated execution of the steps of obtaining large motion measurement data (500), large motion measurement data (500 ) input in the large motion classification module (200), produce the first classification result (600), preserve this first classification result (600)-access the memory (120) of mobile portable communication system (100), so that from memory (120) read at least one stored first classification result (600), - read and analyze at least one first classification result (600) according to predetermined check criteria (800), - generate a verification signal if the check criteria (800) are met (710).

Description

technical field [0001] The present invention relates to a method and system for behavior-based authentication of a user against a mobile portable communication system. Background technique [0002] Mobile portable communication systems are closely integrated into human's daily work and are indispensable. In order to gain access to such systems, a user typically must be authenticated by a personal identification number (PIN), password or perhaps fingerprint. Given the many PIN-protected devices and applications a user uses throughout the day and the many PINs to remember associated with it, it is easy for a user to forget a PIN. Usually freely selectable passwords are either too short to be easy to remember, but this has the disadvantage that they can be guessed quickly and thus provide only low security. In contrast, passwords that provide a high level of security are often long and complex, making them difficult for users to remember. A disadvantage of the fingerprint se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/32G06F21/31G06V40/20
CPCG06F21/316G06F21/32G06V40/20H04M1/67G06F18/2431
Inventor M·佩施克M·施恩亚肯P·伯格尔P·亨尼格
Owner NEXENIO GMBH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products