CN103533546A - Implicit user verification and privacy protection method based on multi-dimensional behavior characteristics - Google Patents

Implicit user verification and privacy protection method based on multi-dimensional behavior characteristics Download PDF

Info

Publication number
CN103533546A
CN103533546A CN201310520123.3A CN201310520123A CN103533546A CN 103533546 A CN103533546 A CN 103533546A CN 201310520123 A CN201310520123 A CN 201310520123A CN 103533546 A CN103533546 A CN 103533546A
Authority
CN
China
Prior art keywords
user
sub
mobile device
confidence level
sub trannum
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201310520123.3A
Other languages
Chinese (zh)
Other versions
CN103533546B (en
Inventor
波澄
张兰
李向阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Meixin Internet Information Technology Co.,Ltd.
Original Assignee
WUXI SENSEHUGE TECHNOLOGY Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by WUXI SENSEHUGE TECHNOLOGY Ltd filed Critical WUXI SENSEHUGE TECHNOLOGY Ltd
Priority to CN201310520123.3A priority Critical patent/CN103533546B/en
Publication of CN103533546A publication Critical patent/CN103533546A/en
Application granted granted Critical
Publication of CN103533546B publication Critical patent/CN103533546B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

The invention relates to an implicit user verification and privacy protection method based on multi-dimensional behavior characteristics. The method comprises the steps as follows: a, data of mobile equipment operation behaviors of a legitimate user is collected; b, a legitimate user operation characteristic model is established; c, a support vector machine is utilized for comparing current behavior characteristic vector with the legitimate user operation characteristic model, so that an operation comparing conclusion about whether a current user is legitimate is obtained, and the confidence level of the operation comparing conclusion is obtained; and d, probability that the current user is legitimate is calculated by a confidence level algorithm according to the current behavior characteristic vector and the confidence level, when the probability of the legitimate user is higher than a set threshold value, the current user is confirmed to be legitimate, otherwise, mobile equipment starts a privacy protection protocol which is set in advance. According to the implicit user verification and privacy protection method based on the multi-dimensional behavior characteristics, the power consumption is low, the probability of simulation and attack is low, accurate user identity recognition can be performed under the condition that the user cannot perceive, and a corresponding privacy protective measure is taken.

Description

Implicit user checking and method for secret protection based on various dimensions behavioural characteristic
Technical field
The present invention relates to a kind of privacy user rs authentication and method for secret protection, especially a kind of implicit user based on various dimensions behavioural characteristic is verified and method for secret protection, belongs to the technical field of secret protection.
Background technology
Along with the development of modern information technologies, people have more and more depended on by various mobile devices, mobile phone for example, and panel computers etc. carry out receiving and dispatching mail, share photos, online transaction, even Smart Home etc.Yet these complicated functions all can be with the hidden danger of serving about safety and privacy leakage.Although these mobile devices are more and more individualized, as long as in the situation that responsive personal information is not revealed, a lot of users are still ready oneself equipment to lend other people, kinsfolk for example, and friend, works together etc.On the other hand, in order not show the distrust for the other side, in most cases user be can be before not giving the other side equipment with password etc. some application and information protection.The fast verification of not discovered when in this case, user is switched and the access control of equipment owner privacy information is become to extremely important.
Traditional method for user rs authentication is passed through password mostly, or sets up the operating specification that specific agreement limits other people.This method is too detailed and loaded down with trivial details, and a lot of users, particularly cellphone subscriber are reluctant to take such measure to protect individual privacy.Although the IOS system of apple provides the access control of some application, switch frequently still abnormal inconvenient and consuming time.The method of another kind of conventional user rs authentication is the method by face recognition, and user can be self-defined need to be by the method the application program as access control.Yet the accuracy of face recognition is a very large challenge, in particular for mobile device always; And take pictures frequently and also can affect to a great extent user's normal use.
Nearest method is to identify and distinguish user with a kind of communication mode based on capacitive touch-control.In this method, the token in the time of user's touch screen in user's hand (ring that for example possesses communication function) sends the signal of communication that possesses user's unique identifier, thereby carries out user's differentiation.The shortcoming of this method must be used the auxiliary equipment that can communicate by letter.The common problem existing of all the other said methods is to be easy to imitatedly, for example, by photo, cheat camera, snatches password, and eavesdrops communicating by letter of token and equipment etc.Therefore, be badly in need of a kind of imitated and user authentication method that steal of being difficult for, and in user is switched the process of identification and access control, user can't be discovered, thereby reach the effect of secret protection.
Summary of the invention
The object of the invention is to overcome the deficiencies in the prior art; a kind of implicit user checking and method for secret protection based on various dimensions behavioural characteristic is provided; its low-power consumption; be difficult for imitated and attack; in the situation that user cannot discover, can carry out user identity identification accurately, make corresponding secret protection measure.
According to technical scheme provided by the invention, described implicit user checking and method for secret protection based on various dimensions behavioural characteristic, described implicit user checking and method for secret protection comprise the steps:
A, the behavior of validated user operation mobile device is carried out to data acquisition, obtain some lawful acts data; The described lawful acts data to mobile device comprise the mode of operation of mobile device and operant response corresponding to described mode of operation;
B, according to the above-mentioned lawful acts data to mobile device, obtain lawful acts characteristic vector, to lawful acts characteristic vector, utilize SVMs training to set up validated user operating characteristics model;
C, active user is carried out to data acquisition to each operation behavior of mobile device, obtain current behavior data, described current behavior data comprise the operant response to the mode of operation of mobile device and described mode of operation; According to current behavior data, obtain current behavior characteristic vector, utilize SVMs that current behavior characteristic vector and validated user operating characteristics model are compared, take and obtain operation conclusion and the described operation confidence level of conclusion relatively relatively whether active user is validated user;
D, according to above-mentioned current behavior characteristic vector and confidence level, utilize confidence level algorithm to calculate the probability that active user is validated user; When the probability of described validated user is during higher than setting threshold, confirm that active user is validated user, otherwise mobile device starts predefined secret protection agreement.
In described step b, lawful acts characteristic vector is expressed as O<sub TranNum="62">i</sub>={ A<sub TranNum="63">i</sub>, G<sub TranNum="64">i</sub>f<sub TranNum="65">i1</sub>, f<sub TranNum="66">i2</sub>, f<sub TranNum="67">i3</sub>, f<sub TranNum="68">i4</sub>, f<sub TranNum="69">i5</sub>, f<sub TranNum="70">i6</sub>, R<sub TranNum="71">i</sub>, wherein, A<sub TranNum="72">i</sub>represent i application of current mobile device, G<sub TranNum="73">i</sub>the mode of operation that represents described i application, f<sub TranNum="74">ij</sub>(0<j≤6) represent for described i j the feature that application is corresponding, R<sub TranNum="75">i</sub>=1 represents validated user, otherwise, R<sub TranNum="76">i</sub>=-1.
After obtaining validated user operating characteristics model, according to lawful acts data, calculate the probability that uses Another application after an application of operation, set up validated user Markov model; Active user is being carried out after current behavior data acquisition, calculating active user's Markov model; Active user's Markov model and validated user Markov model are compared, obtain auxiliary relatively conclusion; After mobile device mixing operation comparison conclusion and auxiliary comparison conclusion, be confirmed confidence level; Mobile device utilizes confidence level algorithm to calculate the probability that active user is validated user according to current behavior characteristic vector and confirmation confidence level.
In described steps d, mobile device utilizes the method that confidence level algorithm calculating active user is validated user probability to be:
&theta; i ( X 1 , X 2 , . . . , X i ) = 1 - ( &Pi; k = 1 i 1 - &epsiv; k ( X k ) )
Wherein, X ibe i mode of operation, ε k(X k) represent the confidence level of k mode of operation.
Also comprise step e, utilize dynamic programming method to carry out later observation, the method for described later observation is:
U(E t,T t)=max(1-(1-U cur(E cur,T cur))×(1-U(E t-E cur,T t-T cur)))
Wherein, U (E t, T t) be illustrated in energy constantly of t and the effectiveness under time restriction, E curthe energy that represents current time, T currepresent current time, U curthe effectiveness that represents current time, E trepresent t energy constantly.
In described step a, described lawful acts data also comprise the data characteristics under motion state.
Advantage of the present invention: the method based on user behavior feature has safe, is difficult for feature imitated and that attack; The method can be carried out the subscriber authentication of implicit expression in the situation that user cannot discover, and can effectively defend malicious user to facilitate the use of validated user simultaneously; The method utilizes user's operating data and motion sensor data to verify, has feature low in energy consumption; The method can identify user identity in the short time at the utmost point, and recognition accuracy is high, and time delay is low; The method completely can be supported on mobile device and use, and makes the range of application of the method not be subject to platform constraints.
Accompanying drawing explanation
Fig. 1 is workflow diagram of the present invention.
Embodiment
Below in conjunction with concrete drawings and Examples, the invention will be further described.
Existing password be easy to be stolen or the method for face recognition easily imitated, but different user is used the behavior pattern of mobile device, the application program of using as being accustomed to and the position of clicking screen, dynamics size, time length, have larger difference and be difficult to imitatedly, so the password that user's behavior pattern can be used as a kind of stealth carries out subscriber authentication.For current intelligent touch screen equipment, for example mobile phone, touches in the process of mobile device screen user, conventionally can make equipment produce small position and the variation of attitude.Due to the most integrated motion sensor of current smart machine, these small reactions for touching can well reflect from the data of transducer, and in different user's use procedures, the reaction of mobile phone has different characteristic conventionally.In addition,, when user uses mobile phone in motion process, as walked, the difference of the motor pattern of different user can embody by motion sensor too.
As shown in Figure 1: a kind of implicit user checking and method for secret protection based on user's various dimensions behavioural characteristic that the present invention proposes; this user authentication method is difficult for imitated and attacks; and can in the situation that user cannot discover, carry out quick and precisely user identity identification, described implicit user checking and method for secret protection comprise the steps:
A, the behavior of validated user operation mobile device is carried out to data acquisition, obtain some lawful acts data; The described lawful acts data to mobile device comprise the mode of operation of mobile device and operant response corresponding to described mode of operation;
Lawful acts data mainly comprise operant response two parts of the equipment that validated user brings for mode of operation and this mode of operation of mobile device.For current Intelligent mobile equipment, by the running background at mobile device, gather user's mode of operation, comprise interactive application, touch coordinate, duration of contact, touch pressure size etc.In addition, operation for each user, mobile device can be made corresponding physical reactions, when the running background collection user of mobile device contacts with device screen, cause the slight variation of equipment attitude, comprise vibration and the rotation (be mainly reflected in the variation of acceleration and angular speed) of equipment in locus.
B, according to the above-mentioned lawful acts data to mobile device, obtain lawful acts characteristic vector, to lawful acts characteristic vector, utilize SVMs training to set up validated user operating characteristics model;
Because the great majority application in current mobile device can have multiple modes of operation, comprising: click, slide, roll etc., mobile device also makes a big difference for the reaction of the different operating mode of same application.Therefore, represent a user's behavioural characteristic in conjunction with the reaction of application, mode of operation and equipment, lawful acts characteristic vector is expressed as O<sub TranNum="115">i</sub>={ A<sub TranNum="116">i</sub>, G<sub TranNum="117">i</sub>f<sub TranNum="118">i1</sub>, f<sub TranNum="119">i2</sub>, f<sub TranNum="120">i3</sub>, f<sub TranNum="121">i4</sub>, f<sub TranNum="122">i5</sub>, f<sub TranNum="123">i6</sub>, R<sub TranNum="124">i</sub>, wherein, A<sub TranNum="125">i</sub>represent i application of current mobile device, G<sub TranNum="126">i</sub>the mode of operation that represents described i application, f<sub TranNum="127">ij</sub>(0<j≤6) represent for j feature corresponding to described i application (be respectively coordinate, the duration, pressure size, shakes, and rotates), R<sub TranNum="128">i</sub>=1 represents validated user, otherwise, R<sub TranNum="129">i</sub>=-1.
Above-mentioned lawful acts data are mainly under static state used mobile device based on user in implementation process.Yet when user is in motion process, for example walking can not reflect with the interaction mode of equipment under the states such as running from sensor information.Its main cause is because when user is in motion process, the movable information that device sensor obtains can flood the attitude change information of equipment self.Therefore, in the embodiment of the present invention, by sensor information, judge that active user remains static or motion state, to the user under motion state, by adopting the data characteristics of SVMs study motion sensor, form the motion feature of this validated user, and motion feature is added to user characteristics vector, carry out subscriber authentication.
At validated user, use in the process of Intelligent mobile equipment, by constantly gather this user's operating data and application usage data, continuous updating and Improving Equipment owner's operation model and following Markov model on backstage.
C, active user is carried out to data acquisition to each operation behavior of mobile device, obtain current behavior data, described current behavior data comprise the operant response to the mode of operation of mobile device and described mode of operation; According to current behavior data, obtain current behavior characteristic vector, utilize SVMs that current behavior characteristic vector and validated user operating characteristics model are compared, take and obtain operation conclusion and the described operation confidence level of conclusion relatively relatively whether active user is validated user;
D, according to above-mentioned current behavior characteristic vector and confidence level, utilize confidence level algorithm to calculate the probability that active user is validated user; When the probability of described validated user is during higher than setting threshold, confirm that active user is validated user, otherwise mobile device starts predefined secret protection agreement.
Further, current Intelligent mobile equipment is on average installed the approximately application over 40 sections, and the frequency of utilization of each application is according to individual habit of user, occupation, sex and huge difference.In addition, user's use for application in the process of conventionally using Intelligent mobile equipment has own unique custom to use sequence.Therefore the method is by the frequency of utilization of all application in system is carried out to statistical computation, and calculates the probability that uses Another application after application-specific, thereby sets up each user's Markov model.After obtaining validated user operating characteristics model, according to lawful acts data, calculate the probability that uses Another application after an application of operation, set up validated user Markov model; Active user is being carried out after current behavior data acquisition, calculating active user's Markov model; Active user's Markov model and validated user Markov model are compared, obtain auxiliary relatively conclusion; After mobile device mixing operation comparison conclusion and auxiliary comparison conclusion, be confirmed confidence level; Mobile device utilizes confidence level algorithm to calculate the probability that active user is validated user according to current behavior characteristic vector and confirmation confidence level.
In addition, can also adopt take a picture and the method for face recognition as supplementary means, for the user of current mobile device, take pictures and analyze, to confirm user's identity, acquisition confidence level.
Mobile device utilizes confidence level algorithm to calculate the method that active user is validated user probability:
&theta; i ( X 1 , X 2 , . . . , X i ) = 1 - ( &Pi; k = 1 i 1 - &epsiv; k ( X k ) )
Wherein, X ibe i mode of operation, θ ithe probable value of expression from first mode of operation to i mode of operation, ε k(X k) represent the confidence level of k mode of operation.
Also comprise step e, utilize dynamic programming method to carry out later observation, the method for described later observation is:
U(E t,T t)=max(1-(1-U cur(E cur,T cur))×(1-U(E t-E cur,T t-T cur)))
Wherein, U (E t, T t) be illustrated in energy constantly of t and the effectiveness under time restriction, E curthe energy that represents current time, T currepresent current time, U curthe effectiveness that represents current time, E trepresent t energy constantly, Tt represents that t constantly.
Owing to current user being identified to institute's consumed energy with respect to judging that by user's behavior pattern identity is large by the method for photograph and image recognition, therefore in the selection of view mode, follow fast the principle of low-power consumption.On the method adopting for next step observation post is selected, dynamic programming method is used in this invention, in certain energy budget and identification reference time delay, by the fastest observation compound mode, obtains result.In the embodiment of the present invention, constantly repeat above-mentioned identifying, until identify user identity, realize the implicit user checking to mobile device, after user rs authentication, can start in time required method for secret protection.

Claims (6)

1. the checking of the implicit user based on various dimensions behavioural characteristic and a method for secret protection, is characterized in that, described implicit user checking and method for secret protection comprise the steps:
(a), the behavior of validated user operation mobile device is carried out to data acquisition, obtain some lawful acts data; The described lawful acts data to mobile device comprise the mode of operation of mobile device and operant response corresponding to described mode of operation;
(b), according to the above-mentioned lawful acts data to mobile device, obtain lawful acts characteristic vector, to lawful acts characteristic vector, utilize SVMs training to set up validated user operating characteristics model;
(c), active user is carried out to data acquisition to each operation behavior of mobile device, obtain current behavior data, described current behavior data comprise the operant response to the mode of operation of mobile device and described mode of operation; According to current behavior data, obtain current behavior characteristic vector, utilize SVMs that current behavior characteristic vector and validated user operating characteristics model are compared, take and obtain operation conclusion and the described operation confidence level of conclusion relatively relatively whether active user is validated user;
(d), according to above-mentioned current behavior characteristic vector and confidence level, utilize confidence level algorithm to calculate the probability that active user is validated user; When the probability of described validated user is during higher than setting threshold, confirm that active user is validated user, otherwise mobile device starts predefined secret protection agreement.
2. implicit user checking and the method for secret protection based on various dimensions behavioural characteristic according to claim 1, is characterized in that: in described step (b), lawful acts characteristic vector is expressed as O<sub TranNum="172">i</sub>={ A<sub TranNum="173">i</sub>, G<sub TranNum="174">i</sub>f<sub TranNum="175">i1</sub>, f<sub TranNum="176">i2</sub>, f<sub TranNum="177">i3</sub>, f<sub TranNum="178">i4</sub>, f<sub TranNum="179">i5</sub>, f<sub TranNum="180">i6</sub>, R<sub TranNum="181">i</sub>, wherein, A<sub TranNum="182">i</sub>represent i application of current mobile device, G<sub TranNum="183">i</sub>the mode of operation that represents described i application, f<sub TranNum="184">ij</sub>(0<j≤6) represent for described i j the feature that application is corresponding, R<sub TranNum="185">i</sub>=1 represents validated user, otherwise, R<sub TranNum="186">i</sub>=-1.
3. the implicit user based on various dimensions behavioural characteristic according to claim 1 is verified and method for secret protection, it is characterized in that: after obtaining validated user operating characteristics model, according to lawful acts data, calculate the probability that uses Another application after an application of operation, set up validated user Markov model; Active user is being carried out after current behavior data acquisition, calculating active user's Markov model; Active user's Markov model and validated user Markov model are compared, obtain auxiliary relatively conclusion; After mobile device mixing operation comparison conclusion and auxiliary comparison conclusion, be confirmed confidence level; Mobile device utilizes confidence level algorithm to calculate the probability that active user is validated user according to current behavior characteristic vector and confirmation confidence level.
4. implicit user checking and the method for secret protection based on various dimensions behavioural characteristic according to claim 1, is characterized in that, in described step (d), mobile device utilizes the method that confidence level algorithm calculating active user is validated user probability to be:
&theta; i ( X 1 , X 2 , . . . , X i ) = 1 - ( &Pi; k = 1 i 1 - &epsiv; k ( X k ) )
Wherein, X ibe i mode of operation, ε k(X k) represent the confidence level of k mode of operation.
5. implicit user checking and the method for secret protection based on various dimensions behavioural characteristic according to claim 1, is characterized in that, also comprises step (e), utilizes dynamic programming method to carry out later observation, and the method for described later observation is:
U(E t,T t)=max(1-(1-U cur(E cur,T cur))×(1-U(E t-E cur,T t-T cur)))
Wherein, U (E t, T t) be illustrated in energy constantly of t and the effectiveness under time restriction, E curthe energy that represents current time, T currepresent current time, U curthe effectiveness that represents current time, E trepresent t energy constantly.
6. implicit user checking and the method for secret protection based on various dimensions behavioural characteristic according to claim 1, is characterized in that, in described step (a), described lawful acts data also comprise the data characteristics under motion state.
CN201310520123.3A 2013-10-29 2013-10-29 Implicit user verification and privacy protection method based on multi-dimensional behavior characteristics Active CN103533546B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310520123.3A CN103533546B (en) 2013-10-29 2013-10-29 Implicit user verification and privacy protection method based on multi-dimensional behavior characteristics

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310520123.3A CN103533546B (en) 2013-10-29 2013-10-29 Implicit user verification and privacy protection method based on multi-dimensional behavior characteristics

Publications (2)

Publication Number Publication Date
CN103533546A true CN103533546A (en) 2014-01-22
CN103533546B CN103533546B (en) 2017-03-22

Family

ID=49935137

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310520123.3A Active CN103533546B (en) 2013-10-29 2013-10-29 Implicit user verification and privacy protection method based on multi-dimensional behavior characteristics

Country Status (1)

Country Link
CN (1) CN103533546B (en)

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103530543A (en) * 2013-10-30 2014-01-22 无锡赛思汇智科技有限公司 Behavior characteristic based user recognition method and system
CN104125335A (en) * 2014-06-24 2014-10-29 小米科技有限责任公司 Method, device and system for managing authority
CN104281795A (en) * 2014-09-25 2015-01-14 同济大学 Mouse action based password fault tolerance method
WO2016112687A1 (en) * 2015-01-14 2016-07-21 中兴通讯股份有限公司 Method and apparatus for identity authentication on terminal and terminal
CN105843889A (en) * 2016-03-21 2016-08-10 华南师范大学 Credibility based big data and general data oriented data collection method and system
CN105844126A (en) * 2016-03-16 2016-08-10 成都信息工程大学 Automatic identification method of intelligent electronic device user
US9606893B2 (en) 2013-12-06 2017-03-28 Qualcomm Incorporated Methods and systems of generating application-specific models for the targeted protection of vital applications
CN106789879A (en) * 2016-11-18 2017-05-31 合肥铭锶伟途信息科技有限公司 Deep learning personal information management system based on vast capacity FPGA
CN106817342A (en) * 2015-11-30 2017-06-09 北京计算机技术及应用研究所 Active identity authorization system based on user behavior feature recognition
CN106888204A (en) * 2016-12-27 2017-06-23 中国科学院软件研究所 Implicit identity identifying method based on natural interaction
CN106940764A (en) * 2016-01-05 2017-07-11 阿里巴巴集团控股有限公司 A kind of user authentication method and terminal device
CN107122641A (en) * 2017-04-25 2017-09-01 杭州安石信息技术有限公司 Smart machine owner recognition methods and owner's identifying device based on use habit
US9787685B2 (en) 2014-06-24 2017-10-10 Xiaomi Inc. Methods, devices and systems for managing authority
CN107438845A (en) * 2015-06-15 2017-12-05 谷歌公司 Device security based on screen analysis
CN107451445A (en) * 2017-07-17 2017-12-08 广东欧珀移动通信有限公司 A kind of method of unlocking screen, terminal and storage medium
CN107465658A (en) * 2017-06-23 2017-12-12 南京航空航天大学 A kind of web portal security defence method of the user characteristics identification based on HTML5
CN108509803A (en) * 2018-03-15 2018-09-07 平安科技(深圳)有限公司 A kind of display methods and terminal device of application icon
CN109446768A (en) * 2018-10-09 2019-03-08 北京北信源软件股份有限公司 Application access abnormal behavior detection method and system
CN110121872A (en) * 2017-02-16 2019-08-13 华为技术有限公司 Subscriber authentication system and method
CN110674480A (en) * 2019-10-11 2020-01-10 同盾控股有限公司 Behavior data processing method, device and equipment and readable storage medium
WO2020199163A1 (en) * 2019-04-03 2020-10-08 Citrix Systems, Inc. Systems and methods for protecting remotely hosted application from malicious attacks
TWI734466B (en) * 2019-11-19 2021-07-21 大陸商支付寶(杭州)信息技術有限公司 Risk assessment method and device for leakage of privacy data
CN114614983A (en) * 2022-02-28 2022-06-10 北京理工大学 Feature fusion privacy protection method based on secure multi-party computation

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101365193A (en) * 2007-08-09 2009-02-11 财团法人Seoul大学校产学协力财团 System and method for customer authentication execution based on customer behavior mode
CN102970289A (en) * 2012-11-09 2013-03-13 同济大学 Identity authentication method based on Web user behavior model
CN103077356A (en) * 2013-01-11 2013-05-01 中国地质大学(武汉) Protecting and tracking method for primary information of mobile terminal based on user behavior pattern

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101365193A (en) * 2007-08-09 2009-02-11 财团法人Seoul大学校产学协力财团 System and method for customer authentication execution based on customer behavior mode
CN102970289A (en) * 2012-11-09 2013-03-13 同济大学 Identity authentication method based on Web user behavior model
CN103077356A (en) * 2013-01-11 2013-05-01 中国地质大学(武汉) Protecting and tracking method for primary information of mobile terminal based on user behavior pattern

Cited By (38)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103530543A (en) * 2013-10-30 2014-01-22 无锡赛思汇智科技有限公司 Behavior characteristic based user recognition method and system
US9606893B2 (en) 2013-12-06 2017-03-28 Qualcomm Incorporated Methods and systems of generating application-specific models for the targeted protection of vital applications
US9652362B2 (en) 2013-12-06 2017-05-16 Qualcomm Incorporated Methods and systems of using application-specific and application-type-specific models for the efficient classification of mobile device behaviors
CN104125335A (en) * 2014-06-24 2014-10-29 小米科技有限责任公司 Method, device and system for managing authority
WO2015196714A1 (en) * 2014-06-24 2015-12-30 小米科技有限责任公司 Permission management method, device and system
US9787685B2 (en) 2014-06-24 2017-10-10 Xiaomi Inc. Methods, devices and systems for managing authority
CN104125335B (en) * 2014-06-24 2017-08-25 小米科技有限责任公司 Right management method, apparatus and system
CN104281795B (en) * 2014-09-25 2017-10-31 同济大学 Password fault-tolerance approach based on mouse behavior
WO2016045225A1 (en) * 2014-09-25 2016-03-31 同济大学 Password fault tolerance method based on mouse behaviour
CN104281795A (en) * 2014-09-25 2015-01-14 同济大学 Mouse action based password fault tolerance method
CN105844123A (en) * 2015-01-14 2016-08-10 中兴通讯股份有限公司 Method and device for identity authentication on terminal, and terminal
WO2016112687A1 (en) * 2015-01-14 2016-07-21 中兴通讯股份有限公司 Method and apparatus for identity authentication on terminal and terminal
US10803408B2 (en) 2015-06-15 2020-10-13 Google Llc Screen-analysis based device security
CN107438845B (en) * 2015-06-15 2021-01-01 谷歌有限责任公司 Device security based on screen analysis
US11558368B2 (en) 2015-06-15 2023-01-17 Google Llc Screen-analysis based device security
CN107438845A (en) * 2015-06-15 2017-12-05 谷歌公司 Device security based on screen analysis
CN106817342A (en) * 2015-11-30 2017-06-09 北京计算机技术及应用研究所 Active identity authorization system based on user behavior feature recognition
CN106940764A (en) * 2016-01-05 2017-07-11 阿里巴巴集团控股有限公司 A kind of user authentication method and terminal device
CN105844126A (en) * 2016-03-16 2016-08-10 成都信息工程大学 Automatic identification method of intelligent electronic device user
CN105843889A (en) * 2016-03-21 2016-08-10 华南师范大学 Credibility based big data and general data oriented data collection method and system
CN106789879A (en) * 2016-11-18 2017-05-31 合肥铭锶伟途信息科技有限公司 Deep learning personal information management system based on vast capacity FPGA
CN106888204A (en) * 2016-12-27 2017-06-23 中国科学院软件研究所 Implicit identity identifying method based on natural interaction
CN106888204B (en) * 2016-12-27 2022-05-17 中国科学院软件研究所 Implicit identity authentication method based on natural interaction
CN110121872A (en) * 2017-02-16 2019-08-13 华为技术有限公司 Subscriber authentication system and method
CN107122641A (en) * 2017-04-25 2017-09-01 杭州安石信息技术有限公司 Smart machine owner recognition methods and owner's identifying device based on use habit
CN107122641B (en) * 2017-04-25 2020-06-16 杭州义盾信息技术有限公司 Intelligent equipment owner identification method and intelligent equipment owner identification device based on use habit
CN107465658B (en) * 2017-06-23 2020-12-25 南京航空航天大学 Website security defense method based on HTML5 user feature recognition
CN107465658A (en) * 2017-06-23 2017-12-12 南京航空航天大学 A kind of web portal security defence method of the user characteristics identification based on HTML5
CN107451445A (en) * 2017-07-17 2017-12-08 广东欧珀移动通信有限公司 A kind of method of unlocking screen, terminal and storage medium
CN108509803A (en) * 2018-03-15 2018-09-07 平安科技(深圳)有限公司 A kind of display methods and terminal device of application icon
CN109446768A (en) * 2018-10-09 2019-03-08 北京北信源软件股份有限公司 Application access abnormal behavior detection method and system
WO2020199163A1 (en) * 2019-04-03 2020-10-08 Citrix Systems, Inc. Systems and methods for protecting remotely hosted application from malicious attacks
CN113632080A (en) * 2019-04-03 2021-11-09 思杰系统有限公司 System and method for protecting remotely hosted applications from malicious attacks
US11347842B2 (en) 2019-04-03 2022-05-31 Citrix Systems, Inc. Systems and methods for protecting a remotely hosted application from malicious attacks
CN110674480A (en) * 2019-10-11 2020-01-10 同盾控股有限公司 Behavior data processing method, device and equipment and readable storage medium
TWI734466B (en) * 2019-11-19 2021-07-21 大陸商支付寶(杭州)信息技術有限公司 Risk assessment method and device for leakage of privacy data
CN114614983A (en) * 2022-02-28 2022-06-10 北京理工大学 Feature fusion privacy protection method based on secure multi-party computation
CN114614983B (en) * 2022-02-28 2024-03-22 北京理工大学 Feature fusion privacy protection method based on secure multiparty calculation

Also Published As

Publication number Publication date
CN103533546B (en) 2017-03-22

Similar Documents

Publication Publication Date Title
CN103533546A (en) Implicit user verification and privacy protection method based on multi-dimensional behavior characteristics
CN103530543A (en) Behavior characteristic based user recognition method and system
EP3580911B1 (en) Method and apparatus for authenticating users in internet of things environment
US20210357488A1 (en) Fingerprint Recognition Method and Apparatus, and Touchscreen Terminal
Bo et al. Continuous user identification via touch and movement behavioral biometrics
US8302152B1 (en) Location-based security system for portable electronic device
EP2836957B1 (en) Location-based access control for portable electronic device
US10425410B2 (en) Identity authentication method and apparatus, and user equipment
EP2731066B1 (en) Electronic device and method for controlling payment function of input means
CN103077356B (en) Protecting and tracking method for primary information of mobile terminal based on user behavior pattern
KR101747403B1 (en) Apparatus and method for statistical user identification using incremental user behavior
KR101892145B1 (en) Multiple-Segment Authentication Technologies
EP2657877A2 (en) Methods and systems for conducting smart card transactions
CN107408167A (en) Perform the seamless certification of user
EP3388963B1 (en) Segment-based handwritten signature authentication system and method
WO2019101096A1 (en) Method and device for security verification and mobile terminal
CN105678147B (en) Touch operation method and device
Yang et al. PersonaIA: A lightweight implicit authentication system based on customized user behavior selection
CN109325334B (en) Touch terminal control method and touch terminal
CN104778587A (en) Safety payment method and device
US20230138176A1 (en) User authentication using a mobile device
CN104753898A (en) Verification method, terminal and server
CN109995751B (en) Internet access equipment marking method and device, storage medium and computer equipment
EP3444745A1 (en) System and method for authenticating dynamic movement tracking-based handwritten signature for space division segment
Rahman et al. Movement pattern based authentication for smart mobile devices

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20210331

Address after: 215000 5th floor, building 06, 78 Keling Road, science and Technology City, Suzhou high tech Zone, Jiangsu Province

Patentee after: Suzhou Meixin Internet Information Technology Co.,Ltd.

Address before: No.503, area a, Liye building, Qingyuan Road, science and Technology Park, taikeyuan University, New District, Wuxi City, Jiangsu Province, 214135

Patentee before: WUXI SENSEHUGE TECHNOLOGY Ltd.