CN103533546A - Implicit user verification and privacy protection method based on multi-dimensional behavior characteristics - Google Patents
Implicit user verification and privacy protection method based on multi-dimensional behavior characteristics Download PDFInfo
- Publication number
- CN103533546A CN103533546A CN201310520123.3A CN201310520123A CN103533546A CN 103533546 A CN103533546 A CN 103533546A CN 201310520123 A CN201310520123 A CN 201310520123A CN 103533546 A CN103533546 A CN 103533546A
- Authority
- CN
- China
- Prior art keywords
- user
- sub
- mobile device
- confidence level
- sub trannum
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
Abstract
The invention relates to an implicit user verification and privacy protection method based on multi-dimensional behavior characteristics. The method comprises the steps as follows: a, data of mobile equipment operation behaviors of a legitimate user is collected; b, a legitimate user operation characteristic model is established; c, a support vector machine is utilized for comparing current behavior characteristic vector with the legitimate user operation characteristic model, so that an operation comparing conclusion about whether a current user is legitimate is obtained, and the confidence level of the operation comparing conclusion is obtained; and d, probability that the current user is legitimate is calculated by a confidence level algorithm according to the current behavior characteristic vector and the confidence level, when the probability of the legitimate user is higher than a set threshold value, the current user is confirmed to be legitimate, otherwise, mobile equipment starts a privacy protection protocol which is set in advance. According to the implicit user verification and privacy protection method based on the multi-dimensional behavior characteristics, the power consumption is low, the probability of simulation and attack is low, accurate user identity recognition can be performed under the condition that the user cannot perceive, and a corresponding privacy protective measure is taken.
Description
Technical field
The present invention relates to a kind of privacy user rs authentication and method for secret protection, especially a kind of implicit user based on various dimensions behavioural characteristic is verified and method for secret protection, belongs to the technical field of secret protection.
Background technology
Along with the development of modern information technologies, people have more and more depended on by various mobile devices, mobile phone for example, and panel computers etc. carry out receiving and dispatching mail, share photos, online transaction, even Smart Home etc.Yet these complicated functions all can be with the hidden danger of serving about safety and privacy leakage.Although these mobile devices are more and more individualized, as long as in the situation that responsive personal information is not revealed, a lot of users are still ready oneself equipment to lend other people, kinsfolk for example, and friend, works together etc.On the other hand, in order not show the distrust for the other side, in most cases user be can be before not giving the other side equipment with password etc. some application and information protection.The fast verification of not discovered when in this case, user is switched and the access control of equipment owner privacy information is become to extremely important.
Traditional method for user rs authentication is passed through password mostly, or sets up the operating specification that specific agreement limits other people.This method is too detailed and loaded down with trivial details, and a lot of users, particularly cellphone subscriber are reluctant to take such measure to protect individual privacy.Although the IOS system of apple provides the access control of some application, switch frequently still abnormal inconvenient and consuming time.The method of another kind of conventional user rs authentication is the method by face recognition, and user can be self-defined need to be by the method the application program as access control.Yet the accuracy of face recognition is a very large challenge, in particular for mobile device always; And take pictures frequently and also can affect to a great extent user's normal use.
Nearest method is to identify and distinguish user with a kind of communication mode based on capacitive touch-control.In this method, the token in the time of user's touch screen in user's hand (ring that for example possesses communication function) sends the signal of communication that possesses user's unique identifier, thereby carries out user's differentiation.The shortcoming of this method must be used the auxiliary equipment that can communicate by letter.The common problem existing of all the other said methods is to be easy to imitatedly, for example, by photo, cheat camera, snatches password, and eavesdrops communicating by letter of token and equipment etc.Therefore, be badly in need of a kind of imitated and user authentication method that steal of being difficult for, and in user is switched the process of identification and access control, user can't be discovered, thereby reach the effect of secret protection.
Summary of the invention
The object of the invention is to overcome the deficiencies in the prior art; a kind of implicit user checking and method for secret protection based on various dimensions behavioural characteristic is provided; its low-power consumption; be difficult for imitated and attack; in the situation that user cannot discover, can carry out user identity identification accurately, make corresponding secret protection measure.
According to technical scheme provided by the invention, described implicit user checking and method for secret protection based on various dimensions behavioural characteristic, described implicit user checking and method for secret protection comprise the steps:
A, the behavior of validated user operation mobile device is carried out to data acquisition, obtain some lawful acts data; The described lawful acts data to mobile device comprise the mode of operation of mobile device and operant response corresponding to described mode of operation;
B, according to the above-mentioned lawful acts data to mobile device, obtain lawful acts characteristic vector, to lawful acts characteristic vector, utilize SVMs training to set up validated user operating characteristics model;
C, active user is carried out to data acquisition to each operation behavior of mobile device, obtain current behavior data, described current behavior data comprise the operant response to the mode of operation of mobile device and described mode of operation; According to current behavior data, obtain current behavior characteristic vector, utilize SVMs that current behavior characteristic vector and validated user operating characteristics model are compared, take and obtain operation conclusion and the described operation confidence level of conclusion relatively relatively whether active user is validated user;
D, according to above-mentioned current behavior characteristic vector and confidence level, utilize confidence level algorithm to calculate the probability that active user is validated user; When the probability of described validated user is during higher than setting threshold, confirm that active user is validated user, otherwise mobile device starts predefined secret protection agreement.
In described step b, lawful acts characteristic vector is expressed as O<sub TranNum="62">i</sub>={ A<sub TranNum="63">i</sub>, G<sub TranNum="64">i</sub>f<sub TranNum="65">i1</sub>, f<sub TranNum="66">i2</sub>, f<sub TranNum="67">i3</sub>, f<sub TranNum="68">i4</sub>, f<sub TranNum="69">i5</sub>, f<sub TranNum="70">i6</sub>, R<sub TranNum="71">i</sub>, wherein, A<sub TranNum="72">i</sub>represent i application of current mobile device, G<sub TranNum="73">i</sub>the mode of operation that represents described i application, f<sub TranNum="74">ij</sub>(0<j≤6) represent for described i j the feature that application is corresponding, R<sub TranNum="75">i</sub>=1 represents validated user, otherwise, R<sub TranNum="76">i</sub>=-1.
After obtaining validated user operating characteristics model, according to lawful acts data, calculate the probability that uses Another application after an application of operation, set up validated user Markov model; Active user is being carried out after current behavior data acquisition, calculating active user's Markov model; Active user's Markov model and validated user Markov model are compared, obtain auxiliary relatively conclusion; After mobile device mixing operation comparison conclusion and auxiliary comparison conclusion, be confirmed confidence level; Mobile device utilizes confidence level algorithm to calculate the probability that active user is validated user according to current behavior characteristic vector and confirmation confidence level.
In described steps d, mobile device utilizes the method that confidence level algorithm calculating active user is validated user probability to be:
Wherein, X
ibe i mode of operation, ε
k(X
k) represent the confidence level of k mode of operation.
Also comprise step e, utilize dynamic programming method to carry out later observation, the method for described later observation is:
U(E
t,T
t)=max(1-(1-U
cur(E
cur,T
cur))×(1-U(E
t-E
cur,T
t-T
cur)))
Wherein, U (E
t, T
t) be illustrated in energy constantly of t and the effectiveness under time restriction, E
curthe energy that represents current time, T
currepresent current time, U
curthe effectiveness that represents current time, E
trepresent t energy constantly.
In described step a, described lawful acts data also comprise the data characteristics under motion state.
Advantage of the present invention: the method based on user behavior feature has safe, is difficult for feature imitated and that attack; The method can be carried out the subscriber authentication of implicit expression in the situation that user cannot discover, and can effectively defend malicious user to facilitate the use of validated user simultaneously; The method utilizes user's operating data and motion sensor data to verify, has feature low in energy consumption; The method can identify user identity in the short time at the utmost point, and recognition accuracy is high, and time delay is low; The method completely can be supported on mobile device and use, and makes the range of application of the method not be subject to platform constraints.
Accompanying drawing explanation
Fig. 1 is workflow diagram of the present invention.
Embodiment
Below in conjunction with concrete drawings and Examples, the invention will be further described.
Existing password be easy to be stolen or the method for face recognition easily imitated, but different user is used the behavior pattern of mobile device, the application program of using as being accustomed to and the position of clicking screen, dynamics size, time length, have larger difference and be difficult to imitatedly, so the password that user's behavior pattern can be used as a kind of stealth carries out subscriber authentication.For current intelligent touch screen equipment, for example mobile phone, touches in the process of mobile device screen user, conventionally can make equipment produce small position and the variation of attitude.Due to the most integrated motion sensor of current smart machine, these small reactions for touching can well reflect from the data of transducer, and in different user's use procedures, the reaction of mobile phone has different characteristic conventionally.In addition,, when user uses mobile phone in motion process, as walked, the difference of the motor pattern of different user can embody by motion sensor too.
As shown in Figure 1: a kind of implicit user checking and method for secret protection based on user's various dimensions behavioural characteristic that the present invention proposes; this user authentication method is difficult for imitated and attacks; and can in the situation that user cannot discover, carry out quick and precisely user identity identification, described implicit user checking and method for secret protection comprise the steps:
A, the behavior of validated user operation mobile device is carried out to data acquisition, obtain some lawful acts data; The described lawful acts data to mobile device comprise the mode of operation of mobile device and operant response corresponding to described mode of operation;
Lawful acts data mainly comprise operant response two parts of the equipment that validated user brings for mode of operation and this mode of operation of mobile device.For current Intelligent mobile equipment, by the running background at mobile device, gather user's mode of operation, comprise interactive application, touch coordinate, duration of contact, touch pressure size etc.In addition, operation for each user, mobile device can be made corresponding physical reactions, when the running background collection user of mobile device contacts with device screen, cause the slight variation of equipment attitude, comprise vibration and the rotation (be mainly reflected in the variation of acceleration and angular speed) of equipment in locus.
B, according to the above-mentioned lawful acts data to mobile device, obtain lawful acts characteristic vector, to lawful acts characteristic vector, utilize SVMs training to set up validated user operating characteristics model;
Because the great majority application in current mobile device can have multiple modes of operation, comprising: click, slide, roll etc., mobile device also makes a big difference for the reaction of the different operating mode of same application.Therefore, represent a user's behavioural characteristic in conjunction with the reaction of application, mode of operation and equipment, lawful acts characteristic vector is expressed as O<sub TranNum="115">i</sub>={ A<sub TranNum="116">i</sub>, G<sub TranNum="117">i</sub>f<sub TranNum="118">i1</sub>, f<sub TranNum="119">i2</sub>, f<sub TranNum="120">i3</sub>, f<sub TranNum="121">i4</sub>, f<sub TranNum="122">i5</sub>, f<sub TranNum="123">i6</sub>, R<sub TranNum="124">i</sub>, wherein, A<sub TranNum="125">i</sub>represent i application of current mobile device, G<sub TranNum="126">i</sub>the mode of operation that represents described i application, f<sub TranNum="127">ij</sub>(0<j≤6) represent for j feature corresponding to described i application (be respectively coordinate, the duration, pressure size, shakes, and rotates), R<sub TranNum="128">i</sub>=1 represents validated user, otherwise, R<sub TranNum="129">i</sub>=-1.
Above-mentioned lawful acts data are mainly under static state used mobile device based on user in implementation process.Yet when user is in motion process, for example walking can not reflect with the interaction mode of equipment under the states such as running from sensor information.Its main cause is because when user is in motion process, the movable information that device sensor obtains can flood the attitude change information of equipment self.Therefore, in the embodiment of the present invention, by sensor information, judge that active user remains static or motion state, to the user under motion state, by adopting the data characteristics of SVMs study motion sensor, form the motion feature of this validated user, and motion feature is added to user characteristics vector, carry out subscriber authentication.
At validated user, use in the process of Intelligent mobile equipment, by constantly gather this user's operating data and application usage data, continuous updating and Improving Equipment owner's operation model and following Markov model on backstage.
C, active user is carried out to data acquisition to each operation behavior of mobile device, obtain current behavior data, described current behavior data comprise the operant response to the mode of operation of mobile device and described mode of operation; According to current behavior data, obtain current behavior characteristic vector, utilize SVMs that current behavior characteristic vector and validated user operating characteristics model are compared, take and obtain operation conclusion and the described operation confidence level of conclusion relatively relatively whether active user is validated user;
D, according to above-mentioned current behavior characteristic vector and confidence level, utilize confidence level algorithm to calculate the probability that active user is validated user; When the probability of described validated user is during higher than setting threshold, confirm that active user is validated user, otherwise mobile device starts predefined secret protection agreement.
Further, current Intelligent mobile equipment is on average installed the approximately application over 40 sections, and the frequency of utilization of each application is according to individual habit of user, occupation, sex and huge difference.In addition, user's use for application in the process of conventionally using Intelligent mobile equipment has own unique custom to use sequence.Therefore the method is by the frequency of utilization of all application in system is carried out to statistical computation, and calculates the probability that uses Another application after application-specific, thereby sets up each user's Markov model.After obtaining validated user operating characteristics model, according to lawful acts data, calculate the probability that uses Another application after an application of operation, set up validated user Markov model; Active user is being carried out after current behavior data acquisition, calculating active user's Markov model; Active user's Markov model and validated user Markov model are compared, obtain auxiliary relatively conclusion; After mobile device mixing operation comparison conclusion and auxiliary comparison conclusion, be confirmed confidence level; Mobile device utilizes confidence level algorithm to calculate the probability that active user is validated user according to current behavior characteristic vector and confirmation confidence level.
In addition, can also adopt take a picture and the method for face recognition as supplementary means, for the user of current mobile device, take pictures and analyze, to confirm user's identity, acquisition confidence level.
Mobile device utilizes confidence level algorithm to calculate the method that active user is validated user probability:
Wherein, X
ibe i mode of operation, θ
ithe probable value of expression from first mode of operation to i mode of operation, ε
k(X
k) represent the confidence level of k mode of operation.
Also comprise step e, utilize dynamic programming method to carry out later observation, the method for described later observation is:
U(E
t,T
t)=max(1-(1-U
cur(E
cur,T
cur))×(1-U(E
t-E
cur,T
t-T
cur)))
Wherein, U (E
t, T
t) be illustrated in energy constantly of t and the effectiveness under time restriction, E
curthe energy that represents current time, T
currepresent current time, U
curthe effectiveness that represents current time, E
trepresent t energy constantly, Tt represents that t constantly.
Owing to current user being identified to institute's consumed energy with respect to judging that by user's behavior pattern identity is large by the method for photograph and image recognition, therefore in the selection of view mode, follow fast the principle of low-power consumption.On the method adopting for next step observation post is selected, dynamic programming method is used in this invention, in certain energy budget and identification reference time delay, by the fastest observation compound mode, obtains result.In the embodiment of the present invention, constantly repeat above-mentioned identifying, until identify user identity, realize the implicit user checking to mobile device, after user rs authentication, can start in time required method for secret protection.
Claims (6)
1. the checking of the implicit user based on various dimensions behavioural characteristic and a method for secret protection, is characterized in that, described implicit user checking and method for secret protection comprise the steps:
(a), the behavior of validated user operation mobile device is carried out to data acquisition, obtain some lawful acts data; The described lawful acts data to mobile device comprise the mode of operation of mobile device and operant response corresponding to described mode of operation;
(b), according to the above-mentioned lawful acts data to mobile device, obtain lawful acts characteristic vector, to lawful acts characteristic vector, utilize SVMs training to set up validated user operating characteristics model;
(c), active user is carried out to data acquisition to each operation behavior of mobile device, obtain current behavior data, described current behavior data comprise the operant response to the mode of operation of mobile device and described mode of operation; According to current behavior data, obtain current behavior characteristic vector, utilize SVMs that current behavior characteristic vector and validated user operating characteristics model are compared, take and obtain operation conclusion and the described operation confidence level of conclusion relatively relatively whether active user is validated user;
(d), according to above-mentioned current behavior characteristic vector and confidence level, utilize confidence level algorithm to calculate the probability that active user is validated user; When the probability of described validated user is during higher than setting threshold, confirm that active user is validated user, otherwise mobile device starts predefined secret protection agreement.
2. implicit user checking and the method for secret protection based on various dimensions behavioural characteristic according to claim 1, is characterized in that: in described step (b), lawful acts characteristic vector is expressed as O<sub TranNum="172">i</sub>={ A<sub TranNum="173">i</sub>, G<sub TranNum="174">i</sub>f<sub TranNum="175">i1</sub>, f<sub TranNum="176">i2</sub>, f<sub TranNum="177">i3</sub>, f<sub TranNum="178">i4</sub>, f<sub TranNum="179">i5</sub>, f<sub TranNum="180">i6</sub>, R<sub TranNum="181">i</sub>, wherein, A<sub TranNum="182">i</sub>represent i application of current mobile device, G<sub TranNum="183">i</sub>the mode of operation that represents described i application, f<sub TranNum="184">ij</sub>(0<j≤6) represent for described i j the feature that application is corresponding, R<sub TranNum="185">i</sub>=1 represents validated user, otherwise, R<sub TranNum="186">i</sub>=-1.
3. the implicit user based on various dimensions behavioural characteristic according to claim 1 is verified and method for secret protection, it is characterized in that: after obtaining validated user operating characteristics model, according to lawful acts data, calculate the probability that uses Another application after an application of operation, set up validated user Markov model; Active user is being carried out after current behavior data acquisition, calculating active user's Markov model; Active user's Markov model and validated user Markov model are compared, obtain auxiliary relatively conclusion; After mobile device mixing operation comparison conclusion and auxiliary comparison conclusion, be confirmed confidence level; Mobile device utilizes confidence level algorithm to calculate the probability that active user is validated user according to current behavior characteristic vector and confirmation confidence level.
4. implicit user checking and the method for secret protection based on various dimensions behavioural characteristic according to claim 1, is characterized in that, in described step (d), mobile device utilizes the method that confidence level algorithm calculating active user is validated user probability to be:
Wherein, X
ibe i mode of operation, ε
k(X
k) represent the confidence level of k mode of operation.
5. implicit user checking and the method for secret protection based on various dimensions behavioural characteristic according to claim 1, is characterized in that, also comprises step (e), utilizes dynamic programming method to carry out later observation, and the method for described later observation is:
U(E
t,T
t)=max(1-(1-U
cur(E
cur,T
cur))×(1-U(E
t-E
cur,T
t-T
cur)))
Wherein, U (E
t, T
t) be illustrated in energy constantly of t and the effectiveness under time restriction, E
curthe energy that represents current time, T
currepresent current time, U
curthe effectiveness that represents current time, E
trepresent t energy constantly.
6. implicit user checking and the method for secret protection based on various dimensions behavioural characteristic according to claim 1, is characterized in that, in described step (a), described lawful acts data also comprise the data characteristics under motion state.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310520123.3A CN103533546B (en) | 2013-10-29 | 2013-10-29 | Implicit user verification and privacy protection method based on multi-dimensional behavior characteristics |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310520123.3A CN103533546B (en) | 2013-10-29 | 2013-10-29 | Implicit user verification and privacy protection method based on multi-dimensional behavior characteristics |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103533546A true CN103533546A (en) | 2014-01-22 |
CN103533546B CN103533546B (en) | 2017-03-22 |
Family
ID=49935137
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310520123.3A Active CN103533546B (en) | 2013-10-29 | 2013-10-29 | Implicit user verification and privacy protection method based on multi-dimensional behavior characteristics |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103533546B (en) |
Cited By (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103530543A (en) * | 2013-10-30 | 2014-01-22 | 无锡赛思汇智科技有限公司 | Behavior characteristic based user recognition method and system |
CN104125335A (en) * | 2014-06-24 | 2014-10-29 | 小米科技有限责任公司 | Method, device and system for managing authority |
CN104281795A (en) * | 2014-09-25 | 2015-01-14 | 同济大学 | Mouse action based password fault tolerance method |
WO2016112687A1 (en) * | 2015-01-14 | 2016-07-21 | 中兴通讯股份有限公司 | Method and apparatus for identity authentication on terminal and terminal |
CN105843889A (en) * | 2016-03-21 | 2016-08-10 | 华南师范大学 | Credibility based big data and general data oriented data collection method and system |
CN105844126A (en) * | 2016-03-16 | 2016-08-10 | 成都信息工程大学 | Automatic identification method of intelligent electronic device user |
US9606893B2 (en) | 2013-12-06 | 2017-03-28 | Qualcomm Incorporated | Methods and systems of generating application-specific models for the targeted protection of vital applications |
CN106789879A (en) * | 2016-11-18 | 2017-05-31 | 合肥铭锶伟途信息科技有限公司 | Deep learning personal information management system based on vast capacity FPGA |
CN106817342A (en) * | 2015-11-30 | 2017-06-09 | 北京计算机技术及应用研究所 | Active identity authorization system based on user behavior feature recognition |
CN106888204A (en) * | 2016-12-27 | 2017-06-23 | 中国科学院软件研究所 | Implicit identity identifying method based on natural interaction |
CN106940764A (en) * | 2016-01-05 | 2017-07-11 | 阿里巴巴集团控股有限公司 | A kind of user authentication method and terminal device |
CN107122641A (en) * | 2017-04-25 | 2017-09-01 | 杭州安石信息技术有限公司 | Smart machine owner recognition methods and owner's identifying device based on use habit |
US9787685B2 (en) | 2014-06-24 | 2017-10-10 | Xiaomi Inc. | Methods, devices and systems for managing authority |
CN107438845A (en) * | 2015-06-15 | 2017-12-05 | 谷歌公司 | Device security based on screen analysis |
CN107451445A (en) * | 2017-07-17 | 2017-12-08 | 广东欧珀移动通信有限公司 | A kind of method of unlocking screen, terminal and storage medium |
CN107465658A (en) * | 2017-06-23 | 2017-12-12 | 南京航空航天大学 | A kind of web portal security defence method of the user characteristics identification based on HTML5 |
CN108509803A (en) * | 2018-03-15 | 2018-09-07 | 平安科技(深圳)有限公司 | A kind of display methods and terminal device of application icon |
CN109446768A (en) * | 2018-10-09 | 2019-03-08 | 北京北信源软件股份有限公司 | Application access abnormal behavior detection method and system |
CN110121872A (en) * | 2017-02-16 | 2019-08-13 | 华为技术有限公司 | Subscriber authentication system and method |
CN110674480A (en) * | 2019-10-11 | 2020-01-10 | 同盾控股有限公司 | Behavior data processing method, device and equipment and readable storage medium |
WO2020199163A1 (en) * | 2019-04-03 | 2020-10-08 | Citrix Systems, Inc. | Systems and methods for protecting remotely hosted application from malicious attacks |
TWI734466B (en) * | 2019-11-19 | 2021-07-21 | 大陸商支付寶(杭州)信息技術有限公司 | Risk assessment method and device for leakage of privacy data |
CN114614983A (en) * | 2022-02-28 | 2022-06-10 | 北京理工大学 | Feature fusion privacy protection method based on secure multi-party computation |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101365193A (en) * | 2007-08-09 | 2009-02-11 | 财团法人Seoul大学校产学协力财团 | System and method for customer authentication execution based on customer behavior mode |
CN102970289A (en) * | 2012-11-09 | 2013-03-13 | 同济大学 | Identity authentication method based on Web user behavior model |
CN103077356A (en) * | 2013-01-11 | 2013-05-01 | 中国地质大学(武汉) | Protecting and tracking method for primary information of mobile terminal based on user behavior pattern |
-
2013
- 2013-10-29 CN CN201310520123.3A patent/CN103533546B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101365193A (en) * | 2007-08-09 | 2009-02-11 | 财团法人Seoul大学校产学协力财团 | System and method for customer authentication execution based on customer behavior mode |
CN102970289A (en) * | 2012-11-09 | 2013-03-13 | 同济大学 | Identity authentication method based on Web user behavior model |
CN103077356A (en) * | 2013-01-11 | 2013-05-01 | 中国地质大学(武汉) | Protecting and tracking method for primary information of mobile terminal based on user behavior pattern |
Cited By (38)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103530543A (en) * | 2013-10-30 | 2014-01-22 | 无锡赛思汇智科技有限公司 | Behavior characteristic based user recognition method and system |
US9606893B2 (en) | 2013-12-06 | 2017-03-28 | Qualcomm Incorporated | Methods and systems of generating application-specific models for the targeted protection of vital applications |
US9652362B2 (en) | 2013-12-06 | 2017-05-16 | Qualcomm Incorporated | Methods and systems of using application-specific and application-type-specific models for the efficient classification of mobile device behaviors |
CN104125335A (en) * | 2014-06-24 | 2014-10-29 | 小米科技有限责任公司 | Method, device and system for managing authority |
WO2015196714A1 (en) * | 2014-06-24 | 2015-12-30 | 小米科技有限责任公司 | Permission management method, device and system |
US9787685B2 (en) | 2014-06-24 | 2017-10-10 | Xiaomi Inc. | Methods, devices and systems for managing authority |
CN104125335B (en) * | 2014-06-24 | 2017-08-25 | 小米科技有限责任公司 | Right management method, apparatus and system |
CN104281795B (en) * | 2014-09-25 | 2017-10-31 | 同济大学 | Password fault-tolerance approach based on mouse behavior |
WO2016045225A1 (en) * | 2014-09-25 | 2016-03-31 | 同济大学 | Password fault tolerance method based on mouse behaviour |
CN104281795A (en) * | 2014-09-25 | 2015-01-14 | 同济大学 | Mouse action based password fault tolerance method |
CN105844123A (en) * | 2015-01-14 | 2016-08-10 | 中兴通讯股份有限公司 | Method and device for identity authentication on terminal, and terminal |
WO2016112687A1 (en) * | 2015-01-14 | 2016-07-21 | 中兴通讯股份有限公司 | Method and apparatus for identity authentication on terminal and terminal |
US10803408B2 (en) | 2015-06-15 | 2020-10-13 | Google Llc | Screen-analysis based device security |
CN107438845B (en) * | 2015-06-15 | 2021-01-01 | 谷歌有限责任公司 | Device security based on screen analysis |
US11558368B2 (en) | 2015-06-15 | 2023-01-17 | Google Llc | Screen-analysis based device security |
CN107438845A (en) * | 2015-06-15 | 2017-12-05 | 谷歌公司 | Device security based on screen analysis |
CN106817342A (en) * | 2015-11-30 | 2017-06-09 | 北京计算机技术及应用研究所 | Active identity authorization system based on user behavior feature recognition |
CN106940764A (en) * | 2016-01-05 | 2017-07-11 | 阿里巴巴集团控股有限公司 | A kind of user authentication method and terminal device |
CN105844126A (en) * | 2016-03-16 | 2016-08-10 | 成都信息工程大学 | Automatic identification method of intelligent electronic device user |
CN105843889A (en) * | 2016-03-21 | 2016-08-10 | 华南师范大学 | Credibility based big data and general data oriented data collection method and system |
CN106789879A (en) * | 2016-11-18 | 2017-05-31 | 合肥铭锶伟途信息科技有限公司 | Deep learning personal information management system based on vast capacity FPGA |
CN106888204A (en) * | 2016-12-27 | 2017-06-23 | 中国科学院软件研究所 | Implicit identity identifying method based on natural interaction |
CN106888204B (en) * | 2016-12-27 | 2022-05-17 | 中国科学院软件研究所 | Implicit identity authentication method based on natural interaction |
CN110121872A (en) * | 2017-02-16 | 2019-08-13 | 华为技术有限公司 | Subscriber authentication system and method |
CN107122641A (en) * | 2017-04-25 | 2017-09-01 | 杭州安石信息技术有限公司 | Smart machine owner recognition methods and owner's identifying device based on use habit |
CN107122641B (en) * | 2017-04-25 | 2020-06-16 | 杭州义盾信息技术有限公司 | Intelligent equipment owner identification method and intelligent equipment owner identification device based on use habit |
CN107465658B (en) * | 2017-06-23 | 2020-12-25 | 南京航空航天大学 | Website security defense method based on HTML5 user feature recognition |
CN107465658A (en) * | 2017-06-23 | 2017-12-12 | 南京航空航天大学 | A kind of web portal security defence method of the user characteristics identification based on HTML5 |
CN107451445A (en) * | 2017-07-17 | 2017-12-08 | 广东欧珀移动通信有限公司 | A kind of method of unlocking screen, terminal and storage medium |
CN108509803A (en) * | 2018-03-15 | 2018-09-07 | 平安科技(深圳)有限公司 | A kind of display methods and terminal device of application icon |
CN109446768A (en) * | 2018-10-09 | 2019-03-08 | 北京北信源软件股份有限公司 | Application access abnormal behavior detection method and system |
WO2020199163A1 (en) * | 2019-04-03 | 2020-10-08 | Citrix Systems, Inc. | Systems and methods for protecting remotely hosted application from malicious attacks |
CN113632080A (en) * | 2019-04-03 | 2021-11-09 | 思杰系统有限公司 | System and method for protecting remotely hosted applications from malicious attacks |
US11347842B2 (en) | 2019-04-03 | 2022-05-31 | Citrix Systems, Inc. | Systems and methods for protecting a remotely hosted application from malicious attacks |
CN110674480A (en) * | 2019-10-11 | 2020-01-10 | 同盾控股有限公司 | Behavior data processing method, device and equipment and readable storage medium |
TWI734466B (en) * | 2019-11-19 | 2021-07-21 | 大陸商支付寶(杭州)信息技術有限公司 | Risk assessment method and device for leakage of privacy data |
CN114614983A (en) * | 2022-02-28 | 2022-06-10 | 北京理工大学 | Feature fusion privacy protection method based on secure multi-party computation |
CN114614983B (en) * | 2022-02-28 | 2024-03-22 | 北京理工大学 | Feature fusion privacy protection method based on secure multiparty calculation |
Also Published As
Publication number | Publication date |
---|---|
CN103533546B (en) | 2017-03-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103533546A (en) | Implicit user verification and privacy protection method based on multi-dimensional behavior characteristics | |
CN103530543A (en) | Behavior characteristic based user recognition method and system | |
EP3580911B1 (en) | Method and apparatus for authenticating users in internet of things environment | |
US20210357488A1 (en) | Fingerprint Recognition Method and Apparatus, and Touchscreen Terminal | |
Bo et al. | Continuous user identification via touch and movement behavioral biometrics | |
US8302152B1 (en) | Location-based security system for portable electronic device | |
EP2836957B1 (en) | Location-based access control for portable electronic device | |
US10425410B2 (en) | Identity authentication method and apparatus, and user equipment | |
EP2731066B1 (en) | Electronic device and method for controlling payment function of input means | |
CN103077356B (en) | Protecting and tracking method for primary information of mobile terminal based on user behavior pattern | |
KR101747403B1 (en) | Apparatus and method for statistical user identification using incremental user behavior | |
KR101892145B1 (en) | Multiple-Segment Authentication Technologies | |
EP2657877A2 (en) | Methods and systems for conducting smart card transactions | |
CN107408167A (en) | Perform the seamless certification of user | |
EP3388963B1 (en) | Segment-based handwritten signature authentication system and method | |
WO2019101096A1 (en) | Method and device for security verification and mobile terminal | |
CN105678147B (en) | Touch operation method and device | |
Yang et al. | PersonaIA: A lightweight implicit authentication system based on customized user behavior selection | |
CN109325334B (en) | Touch terminal control method and touch terminal | |
CN104778587A (en) | Safety payment method and device | |
US20230138176A1 (en) | User authentication using a mobile device | |
CN104753898A (en) | Verification method, terminal and server | |
CN109995751B (en) | Internet access equipment marking method and device, storage medium and computer equipment | |
EP3444745A1 (en) | System and method for authenticating dynamic movement tracking-based handwritten signature for space division segment | |
Rahman et al. | Movement pattern based authentication for smart mobile devices |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20210331 Address after: 215000 5th floor, building 06, 78 Keling Road, science and Technology City, Suzhou high tech Zone, Jiangsu Province Patentee after: Suzhou Meixin Internet Information Technology Co.,Ltd. Address before: No.503, area a, Liye building, Qingyuan Road, science and Technology Park, taikeyuan University, New District, Wuxi City, Jiangsu Province, 214135 Patentee before: WUXI SENSEHUGE TECHNOLOGY Ltd. |