CN105279411A - Gait bio-feature based mobile device identity recognition method - Google Patents

Gait bio-feature based mobile device identity recognition method Download PDF

Info

Publication number
CN105279411A
CN105279411A CN201510609523.0A CN201510609523A CN105279411A CN 105279411 A CN105279411 A CN 105279411A CN 201510609523 A CN201510609523 A CN 201510609523A CN 105279411 A CN105279411 A CN 105279411A
Authority
CN
China
Prior art keywords
data
user
gait
subsystem
identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510609523.0A
Other languages
Chinese (zh)
Inventor
王瑞锦
何兴高
王昊
李冬芬
李萌
谈辰
李长青
罗炜敏
周玉阳
项阳
高强
李婵娟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Electronic Science and Technology of China
Original Assignee
University of Electronic Science and Technology of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Electronic Science and Technology of China filed Critical University of Electronic Science and Technology of China
Priority to CN201510609523.0A priority Critical patent/CN105279411A/en
Publication of CN105279411A publication Critical patent/CN105279411A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)

Abstract

The invention provides a gait bio-feature based mobile device identity recognition method. The method is combined with a mobile terminal and is perfection and expansion of an existing bio-identification technology. The method consists of two parts of a training module and an identification module. The training module comprises three steps of data acquisition, feature extraction and model establishment; and the identification module comprises to-be-identified user data collection, model matching and notification response. According to the method, by utilizing self functions and convenience of the mobile terminal, data is completely acquired, a scientific mathematic basic model is constructed, and gait information of a user is obtained, so that user uniqueness is ensured. A system adopts a national SMS4 symmetric encryption algorithm to perform encryption, so that the data transmission security is well ensured. The method has the advantages that rich sensor and network functions of the mobile device are fully utilized, a modeling process is combined with daily gaits of the user, and the bio-identification technology can be continuously perfected without the need for a deliberate operation. Compared with other identification modes, the security system is relatively high in concealing property and difficult to target. Meanwhile, no contact is required, the concealing is difficult, and remote identification can be performed, so that the user security guarantee is greatly improved.

Description

A mobile equipment identity authentication method based on gait biological characteristic
Technical field
The invention belongs to biotechnology identification and security fields, mobile terminal, be intended to work out a mobile equipment identity authentication method based on gait biological characteristic, make mobile device become more intelligent and safety.
Background technology
Along with the raising of people's living standard, the consumer that Intelligent mobile equipment becomes people gradually to.According to market survey report, continuation expands by international mobile equipment market scale.Smart machine physique is petite, and it is convenient to carry, and therefore, many lawless persons can carry out pilferage activity to it, obtains illicit income, or uses the pilferage important information obtained in equipment to carry out unlawful activities.Moreover, mobile device is as the personal effects of people, and function is numerous, not only stores the phone of contact person, perhaps also has a series of sensitive information such as mailbox, birthday, even also comprises the privacy informations such as the photo of user, note.When equipment is lost accidentally, the leakage of privacy will become allows people's urgent problem.
Guard technology for smart machine becomes and becomes more and more important.From existing fail-safe software, they protect based on the mode such as password or gesture mostly, but the defect that this mode has it intrinsic, as easily copied, easily revealing, there is no specificity etc., and protection is very passive, so bio-identification becomes the security protection means of main flow.Relative to other living things feature recognition, Gait Recognition has self characteristics and advantages.In recent years, along with the research and development of computer vision technique, utilize computer vision technique to analyze and identify that the gait of people becomes possibility.The requirement of people to social safety is more and more higher simultaneously, and need a kind of method to identify the identity of people quickly and easily, Gait Recognition is paid attention to as a kind of new security means.As behavioural characteristic gait feature have untouchable, be difficult to hide and camouflage, be easy to gather, can the advantage such as perception at a distance.
Summary of the invention
System adopts C/S framework, and client and server adopts the close SM4 of state to be encrypted communication.Client comprises Data Collection, feature extraction, identification response and remote control module.Server comprises gait modeling and control order generation module.
Gait data under data collection module adopts acceleration transducer to collect the different behavior of user, comprises the behaviors such as walking, running, stair activity.
The characteristic extracting module first technology such as level and smooth, the position correction of window service time and filters filter carries out noise reduction to raw data, then extract proper vector according to mathematical formulae to the data after optimization, these features comprise time, discretize distribution etc. between mean value, standard deviation, mean absolute difference, average resultant acceleration, peak value.
Gait modeling utilizes neural network algorithm to carry out modeling to the proper vector that characteristic extracting module produces, and generates behavioral value model and user's detection model respectively, then model is transferred to client.
Identify that first respond module utilizes behavioral value model inspection user current state, then whether invoke user detection model identification active user is legal and respond, if user is illegal, then automatically lock equipment and send unlocking pin to equipment legitimate holder, unlocking pin uses close 128 ciphertexts be encrypted of state.Can decipher in server web page input necessary information after validated user receives ciphertext and obtain expressly.
Control command generation module generates corresponding control command according to subscriber mailbox, password, current time and a random value, comprises jingle bell, vibrations, locates, clears data, sets unlocking pin.When user learns device losses, positioning function determination equipment approximate location can be used, if equipment nearby, jingle bell or vibration function can be used to find equipment; If when determining that equipment cannot be given for change, the function that clears data can be used to remove equipment total data, loss is dropped to minimum.When user forgets Password, the unlocking pin that setting unlocking pin function setting is new can be used.Above-mentioned functions is realized by remote control module opertaing device.
Accompanying drawing explanation
Fig. 1 is data acquisition flow figure
Fig. 2 is feature extraction process flow diagram
Fig. 3 is model Establishing process figure
Fig. 4 is Model Matching process flow diagram
Fig. 5 is push-notification-answer process flow diagram
Embodiment
Below in conjunction with accompanying drawing, the specific embodiment of the present invention is described.
One, data acquisition
Because the gait feature of people under different walking states is not identical, so data acquisition subsystem is envisioned for different walking states stamp different labels, so set up the gait pattern stage in data process subsystem, according to different labels, different models is set up to same person, therefore, the identification rate of native system can improve greatly.
The gait data collected at us is divided into following several types: usual walks, and runs, goes upstairs and go downstairs, other.
Two, data processing
The process of data is included that time window is level and smooth, position correction, filters filter and feature selecting four part, wherein, time window is the basic operation to basic data, reorientation coordinate system is carried out afterwards by position correction, carry out further noise reduction by wave filter again, finally obtain the eigenwert of these data.
(1) time window: for time window, is set to 10 seconds, i.e. the data in time window record 10 second, i.e. T a_Window=10.Adopt windows overlay technology simultaneously, used herein be 50% windows overlay, namely when previous time window Ci record proceeds to 5 seconds, next time window Ci+1 just opens, i.e. T new_Window=5.When smoothing operation time, choose current time window Ci, previous time window Ci-1 and a rear time window Ci+1, get its mean value, H (T current)=(H (T current-T a_Window)+H (T current)+H (T current+ T a_Window))/3, so just can smooth out some noises in data and don't as the too many data of loss.Just can be further processed afterwards.
(2) position correction process: used space geometry knowledge here.Because user puts the direction difference to some extent of mobile phone, the vertical direction of such acceleration transducer cannot be consistent with acceleration of gravity, and the data of sensor will be caused to produce error, so will carry out the calibration operation of position.When tester is static, mobile phone only can be subject to the impact of acceleration of gravity, but in practical situations both, all directions all create acceleration.We can suppose that the direction of g and the vertical direction angle of sensor be the angle of projection on sensor levels face of α, g and human body working direction are β.When measuring, the numerical value of sensor three axles is A, B, C, then real accekeration is:
A′=Asinβ-Bcosβ+Ccosβ
B′=Bsinβsinα-Csinβcosα+Ccosβsinα
C′=Bsinβcosα+Csinβsinα-Ccosβcoaα
Just can be calibrated to the coordinate system of standard after operating above under.
(3) filters filter: utilize the direction of travel reprojection of complementary filter in three dimensions orthogonal to plane here.Afterwards with reference to gait pattern, in the maximum deceleration time period, high frequency noise and other influences factor are removed by a low-pass filter by square place, and the vector obtained the most at last, by median filter, then exports.
Three, feature extraction
Although the data collected can not embody the gait of a people intuitively, this biological characteristic can well be embodied by the eigenwert extracted.The cadence that everyone walks, paces size etc. are not quite similar, and these can be embodied by following characteristics, such as: the time between peak value can embody a people normally walk frequency.
During feature extraction, suppose there are n bar data, three axles are x-axis, y-axis, z-axis; Mean value is avg, and standard deviation is sd, and mean absolute difference is aad, and average resultant acceleration is ara.
Mean value (3): mean value (x, y, the z) avg of each axle x=(x 1+ x 2+ ... + x n)/n.
Standard deviation (3): the standard deviation (x, y, z) of each axle
sd x = 1 n ( | x 1 - avg x | 2 + | x 2 - avg x | 2 + ... + | x i - avg x | 2 ) .
Mean absolute difference (3): aad x = 1 n ( Σ i = 1 n | x i - avg x | ) .
Average resultant acceleration (1): a r a = 1 n ( Σ i = 1 n x i 2 + y i 2 + z i 2 ) .
Time (3) between peak value: by data fitting function try to achieve ω.
Discretize distribution (30): take out each number of axle according to inner maximal value and minimum value, the difference of subtracting each other divided by 10 result as interval, calculate the number percent shared by number put in each interval.
Four, Modling model
First, utilize all data collected, use weka Data Mining Tools to set up User Status model.WEKA, as a disclosed data mining workbench, has gathered a large amount of machine learning algorithm bearing data mining task, has comprised and carry out pre-service to data, classification, recurrence, cluster, correlation rule and visual on new interactive interface.Used neural network respectively in our experimentation, Naive Bayes Classification, J48 algorithm and our improve after neural network algorithm carry out Modling model, the result of experiment shows that the neural network effect after improving is optimum.
Five, user data to be identified is collected
The data acquisition of this step and training stage is similar, unlike, the data collected by this step do not have label and name, and these data only have x, and the data of y, z tri-axles, for next step.
Six, Model Matching
After getting the data of previous step, first carry out state coupling, namely mate with the User Status model of previous step, coupling obtains result.The process of coupling is similar to the process of classification, and after model is set up, by the data of real-time collection user, the process of feature extraction is consistent with above-mentioned feature extraction, finally using the feature that extracts as the input of model, obtain recognition result.Result is walked, a state in running, stair activity and other four kinds of states.Then, its data mated with user's gait pattern, whether the user that can obtain producing these data is validated user, and analysis result is passed to next stage.
Seven, push-notification-answer
From previous step, get the result whether user is legal, be divided into two kinds of response mechanisms.
If 1. user is legal, do not respond;
If 2. user is illegal, client-side lock equipment, stochastic generation 6 identifying codes, and generate encryption key according to the password that user uses, be encrypted with this double secret key identifying code, send the identifying code after encryption by mail and note two kinds of modes.The password used in the input of server web page after validated user receives ciphertext can be deciphered and be verified code.

Claims (4)

1., based on a mobile equipment identity authentication method for gait biological characteristic, main employing is made up of client and service end, contains three subsystems:
(1) data acquisition subsystem: the gait data being gathered user by the sensor on equipment.
(2) data process subsystem: carrying out noise reduction process by collecting the data obtained, extracting eigenwert afterwards, then comparing process by sorting algorithm, obtaining net result.
(3) push-notification-answer subsystem: user is fed back to obtained result notice.
2. the mobile equipment identity authentication method based on gait biological characteristic according to claim 1, it is characterized in that, Intelligent mobile equipment application as client service data acquisition subsystem, a station server as service end, service data processing subsystem and push-notification-answer subsystem.Client, by network and server communication, makes three subsystems mutually can exchange data.
3. the mobile equipment identity authentication method based on gait biological characteristic according to claim 1, is characterized in that, collects gait data by the application on mobile device, is sent to the server of specifying after calculating eigenwert by internet.If these data are for training, so from data, reading user name and state tag, adding database and being used for training pattern; If these data are for identifying, so read from database and generate user behavior characteristic model, identifying user behavior, after end of identification, from database, read the data of respective behavior again and the user identity model under generating respective behavior, identify user identity.If user identity is legal, so client application normally works; If user is illegal, notice client application locking mobile device, and notify validated user at once.
4. the mobile equipment identity authentication method based on gait biological characteristic according to claim 1, is characterized in that, the operation of biometric identity Verification System is divided into two stages: training stage and cognitive phase.In each stage, subsystem runs in a different manner.In the training stage, user is according to own situation, and first initialization push-notification-answer subsystem sets necessary parameter, and then reminder-data acquisition subsystem gathers dissimilar data; After collecting a given data, notification data processing subsystem goes out acceleration transducer x from the extracting data recorded, y, the data of z tri-axles, carry out the pre-service of data, namely series of computation is carried out to data, subsequently the numerical value calculated is used neural network, decision tree scheduling algorithm generates the gait pattern of user, for next stage.At cognitive phase, the data of data acquisition subsystem Real-time Collection acceleration transducer also allow data process subsystem be processed by the gait pattern generated previous stage, identify whether the user producing these data is validated user, if user is illegal, then trigger notice response subsystem.
CN201510609523.0A 2015-09-22 2015-09-22 Gait bio-feature based mobile device identity recognition method Pending CN105279411A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510609523.0A CN105279411A (en) 2015-09-22 2015-09-22 Gait bio-feature based mobile device identity recognition method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510609523.0A CN105279411A (en) 2015-09-22 2015-09-22 Gait bio-feature based mobile device identity recognition method

Publications (1)

Publication Number Publication Date
CN105279411A true CN105279411A (en) 2016-01-27

Family

ID=55148412

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510609523.0A Pending CN105279411A (en) 2015-09-22 2015-09-22 Gait bio-feature based mobile device identity recognition method

Country Status (1)

Country Link
CN (1) CN105279411A (en)

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106056013A (en) * 2016-06-03 2016-10-26 深圳市金立通信设备有限公司 Terminal burglary prevention method and terminal
CN106331362A (en) * 2016-09-09 2017-01-11 常州大学 Mobile phone theft prevention method based on built-in acceleration sensor
CN106454723A (en) * 2016-09-09 2017-02-22 常州大学 Mobile phone accelerometer based child custody method
CN106850955A (en) * 2016-12-20 2017-06-13 陕西尚品信息科技有限公司 A kind of mobile phone identity verification method based on Gait Recognition
CN106921500A (en) * 2017-03-22 2017-07-04 深圳先进技术研究院 The identity identifying method and device of a kind of mobile device
CN106971203A (en) * 2017-03-31 2017-07-21 中国科学技术大学苏州研究院 Personal identification method based on characteristic on foot
CN106991310A (en) * 2017-03-29 2017-07-28 智慧海派科技有限公司 A kind of intelligent terminal unlocking method based on Gait Recognition
CN107016346A (en) * 2017-03-09 2017-08-04 中国科学院计算技术研究所 gait identification method and system
CN107995181A (en) * 2017-11-27 2018-05-04 上海众人网络安全技术有限公司 A kind of auth method based on gait, device, equipment and storage medium
CN108537014A (en) * 2018-04-04 2018-09-14 深圳大学 A kind of method for authenticating user identity and system based on mobile device
WO2018205424A1 (en) * 2017-05-09 2018-11-15 深圳市科迈爱康科技有限公司 Biometric identification method and terminal based on myoelectricity, and computer-readable storage medium
CN108960171A (en) * 2018-07-12 2018-12-07 安徽工业大学 A method of the transition gesture based on feature transfer learning recognizes identification
CN108959890A (en) * 2018-07-17 2018-12-07 三星电子(中国)研发中心 Control method and electric terminal in electric terminal
CN109035530A (en) * 2018-08-23 2018-12-18 广东汇泰龙科技有限公司 A kind of method for unlocking based on cloud lock-step state identifying system, system
WO2019114337A1 (en) * 2017-12-15 2019-06-20 阿里巴巴集团控股有限公司 Biometric authentication, identification and detection method and device for mobile terminal and equipment
CN110213445A (en) * 2019-06-03 2019-09-06 四川长虹电器股份有限公司 Login system and method are exempted from a kind of iOS application
CN110674480A (en) * 2019-10-11 2020-01-10 同盾控股有限公司 Behavior data processing method, device and equipment and readable storage medium
CN111083278A (en) * 2018-10-21 2020-04-28 内蒙古龙腾睿昊智能有限公司 Collecting and identifying information of breathing, pace and positioning personnel based on smart phone monitoring
CN112214783A (en) * 2020-11-18 2021-01-12 西北大学 Gait recognition platform and method based on trusted execution environment
CN115277143A (en) * 2022-07-19 2022-11-01 中天动力科技(深圳)有限公司 Data secure transmission method, device, equipment and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103310142A (en) * 2013-05-22 2013-09-18 复旦大学 Man-machine fusion security authentication method based on wearable equipment
CN103945060A (en) * 2014-04-04 2014-07-23 惠州Tcl移动通信有限公司 Mobile terminal processing method and system based on sensor recognition

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103310142A (en) * 2013-05-22 2013-09-18 复旦大学 Man-machine fusion security authentication method based on wearable equipment
CN103945060A (en) * 2014-04-04 2014-07-23 惠州Tcl移动通信有限公司 Mobile terminal processing method and system based on sensor recognition

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
刘志丹: "基于手机加速度传感器的身份认证关键技术研究", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *
张丽娜: "基于加速度传感器的步态特征身份认证", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *
胡龙: "基于智能手机的用户行为识别技术研究与应用", 《万方数据知识服务平台》 *

Cited By (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106056013A (en) * 2016-06-03 2016-10-26 深圳市金立通信设备有限公司 Terminal burglary prevention method and terminal
CN106331362A (en) * 2016-09-09 2017-01-11 常州大学 Mobile phone theft prevention method based on built-in acceleration sensor
CN106454723A (en) * 2016-09-09 2017-02-22 常州大学 Mobile phone accelerometer based child custody method
CN106850955B (en) * 2016-12-20 2019-07-02 陕西尚品信息科技有限公司 A kind of mobile phone identity verification method based on Gait Recognition
CN106850955A (en) * 2016-12-20 2017-06-13 陕西尚品信息科技有限公司 A kind of mobile phone identity verification method based on Gait Recognition
CN107016346A (en) * 2017-03-09 2017-08-04 中国科学院计算技术研究所 gait identification method and system
CN106921500A (en) * 2017-03-22 2017-07-04 深圳先进技术研究院 The identity identifying method and device of a kind of mobile device
CN106921500B (en) * 2017-03-22 2020-06-12 深圳先进技术研究院 Identity authentication method and device for mobile equipment
CN106991310A (en) * 2017-03-29 2017-07-28 智慧海派科技有限公司 A kind of intelligent terminal unlocking method based on Gait Recognition
CN106971203A (en) * 2017-03-31 2017-07-21 中国科学技术大学苏州研究院 Personal identification method based on characteristic on foot
CN106971203B (en) * 2017-03-31 2020-06-09 中国科学技术大学苏州研究院 Identity recognition method based on walking characteristic data
WO2018205424A1 (en) * 2017-05-09 2018-11-15 深圳市科迈爱康科技有限公司 Biometric identification method and terminal based on myoelectricity, and computer-readable storage medium
CN107995181B (en) * 2017-11-27 2020-10-30 上海众人网络安全技术有限公司 Gait-based identity authentication method, device, equipment and storage medium
CN107995181A (en) * 2017-11-27 2018-05-04 上海众人网络安全技术有限公司 A kind of auth method based on gait, device, equipment and storage medium
WO2019114337A1 (en) * 2017-12-15 2019-06-20 阿里巴巴集团控股有限公司 Biometric authentication, identification and detection method and device for mobile terminal and equipment
US11288348B2 (en) 2017-12-15 2022-03-29 Advanced New Technologies Co., Ltd. Biometric authentication, identification and detection method and device for mobile terminal and equipment
CN108537014A (en) * 2018-04-04 2018-09-14 深圳大学 A kind of method for authenticating user identity and system based on mobile device
CN108960171B (en) * 2018-07-12 2021-03-02 安徽工业大学 Method for converting gesture recognition into identity recognition based on feature transfer learning
CN108960171A (en) * 2018-07-12 2018-12-07 安徽工业大学 A method of the transition gesture based on feature transfer learning recognizes identification
CN108959890A (en) * 2018-07-17 2018-12-07 三星电子(中国)研发中心 Control method and electric terminal in electric terminal
CN109035530A (en) * 2018-08-23 2018-12-18 广东汇泰龙科技有限公司 A kind of method for unlocking based on cloud lock-step state identifying system, system
CN111083278A (en) * 2018-10-21 2020-04-28 内蒙古龙腾睿昊智能有限公司 Collecting and identifying information of breathing, pace and positioning personnel based on smart phone monitoring
CN110213445A (en) * 2019-06-03 2019-09-06 四川长虹电器股份有限公司 Login system and method are exempted from a kind of iOS application
CN110674480A (en) * 2019-10-11 2020-01-10 同盾控股有限公司 Behavior data processing method, device and equipment and readable storage medium
CN112214783A (en) * 2020-11-18 2021-01-12 西北大学 Gait recognition platform and method based on trusted execution environment
CN112214783B (en) * 2020-11-18 2023-08-25 西北大学 Gait recognition platform and recognition method based on trusted execution environment
CN115277143A (en) * 2022-07-19 2022-11-01 中天动力科技(深圳)有限公司 Data secure transmission method, device, equipment and storage medium
CN115277143B (en) * 2022-07-19 2023-10-20 中天动力科技(深圳)有限公司 Data security transmission method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
CN105279411A (en) Gait bio-feature based mobile device identity recognition method
Nickel et al. Authentication of smartphone users based on the way they walk using k-NN algorithm
Zhu et al. RiskCog: Unobtrusive real-time user authentication on mobile devices in the wild
CN102196431B (en) Internet of things application scene-based protection method of privacy query and private identity verification
US20140347479A1 (en) Methods, Systems, Apparatuses, Circuits and Associated Computer Executable Code for Video Based Subject Characterization, Categorization, Identification, Tracking, Monitoring and/or Presence Response
CN110163611A (en) A kind of personal identification method, device and relevant device
CN102306305B (en) Method for authenticating safety identity based on organic characteristic watermark
CN105678125B (en) A kind of user authen method, device
CN102629320B (en) Ordinal measurement statistical description face recognition method based on feature level
Rawat et al. Artificial cyber espionage based protection of technological enabled automated cities infrastructure by dark web cyber offender
US20180341766A1 (en) Spatiotemporal Authentication
Elmisery et al. Cognitive privacy middleware for deep learning mashup in environmental IoT
Evans et al. Biometrics security and privacy protection [from the guest editors]
CN105637522A (en) World-driven access control using trusted certificates
CN107153780B (en) Writing behavior feature authentication method based on wrist wearable electronic equipment
WO2015025249A2 (en) Methods, systems, apparatuses, circuits and associated computer executable code for video based subject characterization, categorization, identification, tracking, monitoring and/or presence response
CN110276189B (en) User identity authentication method based on gait information
Al-Naffakh et al. Continuous user authentication using smartwatch motion sensor data
CN102004872A (en) Fingerprint encryption-based identity authentication system and implementation method thereof
CN104680670A (en) Re-encryption/encryption technique solution for key control points during bank card operation on ATM (automatic teller machine)
Hintze et al. CORMORANT: Ubiquitous risk-aware multi-modal biometric authentication across mobile devices
Kaiwartya et al. An Investigation on Biometric Internet Security.
CN113672654B (en) Data query method, device, computer equipment and storage medium
CN113742669B (en) User authentication method based on twin network
CN117151736A (en) Anti-electricity fraud management early warning method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20160127