Unlock instant, AI-driven research and patent intelligence for your innovation.

Smart phone auxiliary authentication method based on multi-mode fusion

A technology of smart phones and authentication methods, applied in the field of information security, can solve the problems of inability to obtain illegal users in advance, without considering identity authentication, etc., to achieve the effect of improving accuracy, rich data sources, and high robustness

Active Publication Date: 2021-07-13
ZHEJIANG UNIV
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method uses a two-class support vector machine as a classifier, which is inappropriate, because in practice, the data of illegal users cannot be obtained in advance for training the model
In addition, this method does not consider the user's keystroke behavior for identity authentication. Keystroke behavior is one of the most common behaviors in the process of using a smartphone and contains a wealth of user personal information.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Smart phone auxiliary authentication method based on multi-mode fusion
  • Smart phone auxiliary authentication method based on multi-mode fusion

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments. The following examples and drawings are used to illustrate the present invention, but not to limit the scope of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0042] figure 1 The positional relationship between the X, Y, and Z axes of the four motion sensors used in the present invention, such as the accelerometer, the gyroscope, the magnetometer, and the direction gauge, and the mobile phone is shown.

[0043] figure 2 The system architecture and overall process of the present invention are shown. The whole process includes two parts: the registration phase and the certification phase. The specific implementation steps are as follows:

[0044] R...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a smart phone auxiliary authentication method based on multi-mode fusion. The existing continuous authentication method does not fully utilize abundant data generated when a user operates a mobile phone, the recognition accuracy is low, and the recognition performance is easily influenced by the body posture change of the user. According to the method disclosed by the invention, the identity of the user is continuously authenticated by utilizing the single-finger sliding operation, the continuous keystroke behavior and the sensor data within the duration of the two behaviors of the user. According to the method, a continuous keystroke behavior is set, a two-stage classification technology is adopted, user operation postures are divided into three postures, namely a hand-held mobile phone static posture, a hand-held mobile phone walking posture and a posture that the mobile phone is placed in a static object, the current posture of a user is recognized firstly, and then feature vectors are sent into classifiers under the corresponding postures. According to the method, samples from legal registered users are used for training six single classifiers, and the single classifiers are used for identity recognition. The method is rich in data source and high in robustness, and the authentication accuracy is improved.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a smart phone auxiliary authentication method based on multimodal fusion. Background technique [0002] With the widespread use of smart phones and the continuous enrichment of mobile phone functions, a large amount of personal privacy information such as social networking, pictures, voice and financial information is stored in mobile phones. If these private information is stolen, it may cause damage to users' property and even personal safety. major threat. Identity authentication of current users using mobile phones is an important means to protect personal privacy in mobile phones. Traditional authentication methods such as passwords, patterns, and emerging technologies such as fingerprint and face recognition have certain limitations, such as passwords are easy to forget and be stolen. Shoulder spying, the pattern is more likely to be snooped by a t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/31G06F21/45G06K9/00G06K9/62H04M1/72403
CPCG06F21/316G06F21/45G06V40/20G06F18/2431G06F18/253Y02D30/70
Inventor 陈惠芳余修俊兰贞谢磊
Owner ZHEJIANG UNIV