CN104408341A - Smart phone user identity authentication method based on gyroscope behavior characteristics - Google Patents

Smart phone user identity authentication method based on gyroscope behavior characteristics Download PDF

Info

Publication number
CN104408341A
CN104408341A CN201410641806.9A CN201410641806A CN104408341A CN 104408341 A CN104408341 A CN 104408341A CN 201410641806 A CN201410641806 A CN 201410641806A CN 104408341 A CN104408341 A CN 104408341A
Authority
CN
China
Prior art keywords
gyroscope
contact action
behavioral data
distance
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410641806.9A
Other languages
Chinese (zh)
Other versions
CN104408341B (en
Inventor
沈超
蔡忠闽
左幸存
余天文
管晓宏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Jiaotong University
Original Assignee
Xian Jiaotong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Jiaotong University filed Critical Xian Jiaotong University
Priority to CN201410641806.9A priority Critical patent/CN104408341B/en
Publication of CN104408341A publication Critical patent/CN104408341A/en
Application granted granted Critical
Publication of CN104408341B publication Critical patent/CN104408341B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour

Abstract

The invention discloses a smart phone user identity authentication method based on gyroscope behavior characteristics. The method comprises the following steps: extracting sensor behavior data corresponding to different operation events according to time information of screen touch operation by analyzing gyroscope behavior data generated during screen touch operation of a smart phone user to generate sensor behavior characteristics; establishing an identity authentication model of the user based on the behavior characteristics; performing identity authentication on the smart phone user. The method disclosed by the invention has the advantages that the method is easy to operate, and any additional equipment does not need to be added; the behavior characteristics of the mobile phone user in an authentication process are described by using gyroscope operation behaviors on the basis of not changing the user habit to lay a basis for user identity judgment, so that smear attack and observation attack can be effectively prevented, and extensive safety and adaptability are achieved.

Description

Based on the smart phone user identity identifying method of gyroscope behavioural characteristic
Technical field
The present invention relates to smart phone user authentication, particularly a kind of smart phone user identity identifying method utilizing mobile phone sensor data.
Background technology
Along with the fast development of mobile Internet, smart mobile phone penetrates into all trades and professions, affects each details of people's live and work.The significant data (as account password) that smart mobile phone record is more and more many with store mobile subscriber and privacy information (as note and video).Particularly a large amount of use of mobile-phone payment related application in recent years and the frequent generation of privacy compromise event, makes the safety protection problem of people to smart mobile phone more and more pay close attention to.
Authentication is safely and effectively the key problem of carrying out smart mobile phone safeguard protection, refers to that user is when accessing intelligent mobile phone system or accessing the system resource of different protection level, the process whether identity of this user of system validation is legal.Authentication mode at present for smart mobile phone mainly contains three kinds: 1) PIN password, 2) graphical passwords, 3) fingerprint.For the mode of PIN password, be easy to realize and simple and convenient, but easily pass into silence or be stolen; For the mode of graphical passwords (user need on the dot matrix of 3x3 according to some points that is necessarily linked in sequence as password), be easy to memory, but touch screen vestige and finger motion are easily observed causes guessing attack; For fingerprint recognition mode, although accuracy is high, need special hardware supported.
Summary of the invention
The action behavior utilizing smart phone user to represent in contact action process can as the good means of one replacing or strengthen PIN password/graphical passwords/finger print identifying as the foundation of authentication, simultaneously because mobile phone sensor (as accelerometer or gyroscope) is as built-in device intrinsic in smart mobile phone, can be directly, exactly the action behavior in user's contact action process is reflected and measured, the action behavior of mobile phone gyroscope behavioral data to user that user therefore can be adopted caused when contact action is measured, and in this, as the foundation of authenticating user identification.Compared with the authentication mode of aforementioned three kinds of current popular, gyroscope behavioural characteristic is used to carry out authentication: can not forget and lose, not easily stolen by others and forgery; Simple to operate, do not need special hardware supported, and cost is very low, easily promotes on a large scale; In addition, effectively can prevent from stain from attacking and observe attacking, there is security widely and applicability.
The object of this invention is to provide a kind of smart phone user identity identifying method based on mobile phone sensor data, particularly utilize user in contact action process by the behavioural characteristic of gyroscope record to judge the method for user identity legitimacy.
For reaching above object, the present invention adopts following technical scheme to realize:
Based on a smart phone user identity identifying method for gyroscope behavioural characteristic, it is characterized in that, by train and certification two parts are formed, wherein:
Described training department divides and comprises the steps:
(1) behavioral data that repeatedly formed in contact action process of gyroscope collection recording user, forms training data;
(2) for the behavioral data that each gyroscope records, the gyroscope behavioral data that contact action is corresponding is extracted;
(3) for the gyroscope behavioral data that contact action is corresponding, extract behavioural characteristic vector, obtain reference feature vector wherein, calculate behavioural characteristic vector and the distance of reference feature vector, obtain distance feature vector, form training characteristics set;
(4) adopt single classifier to set up the Model of Identity Authentication System of user, be that positive class is trained Model of Identity Authentication System by the training characteristics aggregated label of validated user, obtain the judging identity threshold value of validated user;
Described authentication section comprises the steps:
(1) when certification, gyroscope obtains the behavioral data that user's contact action identical with training produces, and extracts the gyroscope behavioral data that contact action is corresponding;
(2) for the gyroscope behavioral data that contact action is corresponding, extract behavioural characteristic vector, the reference feature vector obtained when training with the authentication model described in training part carries out distance metric, obtains distance feature vector;
(3) using vectorial for this distance feature input as Model of Identity Authentication System, obtain the detected value of authentication, and this detected value and judging identity threshold value are compared, and then judge the legitimacy of user identity.
In said method, the gyroscope behavioral data that described extraction contact action is corresponding refers to for each contact action, extract contact action when starting and at the end of time, obtain the time interval of contact action, and this time interval is mated with the behavioral data timestamp of gyroscope record, gyroscope behavioral data corresponding under obtaining each contact action.
The described gyroscope behavioral data corresponding for contact action, the concrete grammar extracting behavioural characteristic vector is: extract for gyroscope behavioral data corresponding to contact action, comprise statistical nature and distance feature, specific as follows:
Statistical nature refers to the statistics description amount of the gyroscope behavioral data that each contact action is corresponding, comprising:
Difference, coefficient of kurtosis, the coefficient of skewness of the maximal value of X-axis angular velocity, minimum value, average, intermediate value, standard deviation, 75% fractile and 25% fractile;
Difference, coefficient of kurtosis, the coefficient of skewness of the maximal value of Y-axis angular velocity, minimum value, average, intermediate value, standard deviation, 75% fractile and 25% fractile;
Difference, coefficient of kurtosis, the coefficient of skewness of the maximal value of Z axis angular velocity, minimum value, average, intermediate value, standard deviation, 75% fractile and 25% fractile;
Distance feature refers to the distance metric on identical contact action between gyroscope behavioral data and reference behavioral data, and its concrete calculation procedure is:
1) in identical contact action corresponding gyroscope Behavioral training data, comprise and organize sample data more, adopt dynamic time warping to calculate often to organize sample data and other organizes distance between sample data, obtain distance sum after cumulative, the minimum gyroscope sample data of chosen distance sum is as with reference to behavioral data;
2) adopt the distance of dynamic time warping calculating on each identical contact action between gyroscope behavioral data and reference behavioral data, obtain distance feature.
The acquisition of described reference feature vector refers in the gyroscope behavioral data that contact action is corresponding, manhatton distance is adopted to calculate the distance of each behavioural characteristic vector to other behavioural characteristic vector, form the distance vector that this proper vector is corresponding, the minimum proper vector of chosen distance vector mould is as with reference to proper vector.
The advantage of the inventive method is: gyroscope behavioural characteristic is without the need to memory and carry, not easily stolen by others and forgery; Simple to operate, without the need to increasing any extras; The behavioral trait basis not changing user habit using gyroscope operation behavior describe cellphone subscriber to embody in verification process, in this, as the foundation that user identity judges, effectively can prevent from stain from attacking and observe attacking, there is security widely and applicability.In addition, adopt the character representation method of distance metric effectively can reduce the impact of behavior fluctuation, improve the robustness of authentication significantly.
Accompanying drawing explanation
Below in conjunction with the drawings and the specific embodiments, the present invention is described in further detail.
Fig. 1 is the overall procedure schematic diagram of the inventive method.
Fig. 2 is the idiographic flow schematic diagram of the gyroscope behavioral data extraction that in the inventive method, contact action is corresponding.
Fig. 3 is the idiographic flow schematic diagram of gyroscope behavior distance feature vector extracting method in the inventive method.
Fig. 4 is the screenshotss photo adopting the present invention to carry out the experimental implementation of smart phone user authentication.
Fig. 5 is the experimental result picture adopting the present invention to carry out smart phone user authentication.
Embodiment
See Fig. 1, a kind of smart phone user identity identifying method based on gyroscope behavioural characteristic, can be used for touch-screen equipment operator identity legitimacy and carries out certification, realizes the security protection of individual to touch-screen equipment storage inside and sensitive information.The present invention comprises Model of Identity Authentication System training and operator's authentication two parts, and concrete implementation step is as follows:
1) Model of Identity Authentication System training department divides and comprises the steps:
(1) the gyroscope behavioral data in the click repeatedly in fixing touch screen position of gyroscope collection recording user and slide (contact action) process, obtains training dataset; The form of gyroscope behavioral data is: { angular velocity of horizontal right direction (X-axis), the vertically upward angular velocity of direction (Y-axis), the angular velocity in screen front face normal will direction (Z axis), timestamp }.
(2) for the behavioral data that each gyroscope records, the gyroscope behavioral data (see Fig. 2) that contact action is corresponding is extracted.Be specially:
The first step, during extraction contact action, finger contact and the time leaving touch-screen, obtain the time interval of contact action;
Second step, mates the timestamp of the time interval of each contact action with gyroscope behavioral data, gyroscope behavioral data corresponding under obtaining each contact action.
(3) for the gyroscope behavioral data that contact action is corresponding, extraction behavioural characteristic vector, obtains reference feature vector wherein, calculates the distance of behavioural characteristic vector and reference feature vector, obtain distance feature vector, form training characteristics set (see Fig. 3).Be specially:
The first step, the gyroscope behavioral data that in each contact action process, contact action is corresponding is concentrated for training data, extract gyroscope behavioural characteristic vector, being specially contact action causes smart mobile phone to rock derived a series of gyroscope behavior measures, comprises statistical nature and distance feature two class.Wherein, statistical nature refers to the statistics description amount of the gyroscope behavioral data that each contact action is corresponding, comprises difference, coefficient of kurtosis, the coefficient of skewness of X-axis, Y-axis, the maximal value of Z axis angular velocity, minimum value, average, intermediate value, standard deviation, 75% fractile and 25% fractile; Distance feature refers to gyroscope behavioral data on identical contact action and with reference to the distance metric between behavioral data, its concrete calculation procedure is: first, in identical contact action corresponding gyroscope Behavioral training data, employing dynamic time warping calculates the distance between each gyroscope sample data and other gyroscope sample data, obtain distance sum after cumulative, the minimum gyroscope sample data of chosen distance sum is as with reference to behavioral data; Then, adopt the distance of dynamic time warping calculating on each identical contact action between gyroscope behavioral data and reference behavioral data, obtain distance feature;
Suppose that validated user training acquires n group data, use DTW (dynamic time warping) to calculate the distance sum of certain group data and other n-1 group data vectors respectively.Choose minimum with other n-1 group data Euclidean distances one group as with reference to sample;
Second step, adopt Euclidean distance to calculate gyroscope behavioural characteristic vector and the distance of other gyroscope behavioural characteristic vector in training set in each contact action process, obtain the distance vector (wherein P represent the number of times of in training set contact action process) of dimension for (P-1); Calculation training concentrates the mould of each distance vector, and the gyroscope behavior vector selecting modulus value minimum is as vectorial with reference to behavioural characteristic;
3rd step, manhatton distance is adopted to calculate gyroscope behavioural characteristic vector and the difference value vector with reference to behavior proper vector in each contact action process, as the distance feature vector of gyroscope behavioral data in each contact action process, form gyroscope Behavioral training feature set;
(4) one-class classifier is adopted to set up the Model of Identity Authentication System of validated user, be that positive class is trained Model of Identity Authentication System by the training characteristics aggregated label of validated user, obtain the judging identity threshold value σ (σ chooses according to the precision of model training) of validated user;
2) operator's identity continues authentication section, comprises the steps:
(1) when certification, gyroscope obtains the behavioral data that user's contact action identical with training produces, and extracts the gyroscope behavioral data that contact action is corresponding;
(2) for the gyroscope behavioral data that contact action is corresponding, extract behavioural characteristic vector, the reference feature vector obtained when training with the authentication model described in training part carries out distance metric, obtains distance feature vector;
(3) using the input of this distance feature vector as Model of Identity Authentication System, obtain the detected value of authentication, and by this detected value and validated user judging identity threshold value σ compare, if detected value is greater than threshold value, then the active user judged is as disabled user; If detected value is less than threshold value, then judge that active user is as validated user;
The experiment of smart phone user authentication is carried out according to the present invention
The present invention has carried out experimental verification for the authentication of smart phone user, and concrete steps are as follows:
The first step, generating training data.Requirement of experiment 10 users carry out contact action according to the mode of Fig. 4 respectively on smart mobile phone, repeat 30 times, comprise 3 touch screen clicking operation and 4 touch screen slides at every turn, gather and record gyroscope behavioral data when these users carry out aforesaid operations.In the mode shown in Fig. 4, user carries out touch screen clicking operation on point one, two, three, between point four, five, six, seven, eight, carry out touch screen slide.
Second step, extracts the gyroscope behavioral data that contact action is corresponding in each contact action process.For each user, extract contact action when starting and at the end of time, obtain the time interval that each contact action is corresponding; The timestamp of the time interval of each contact action with gyroscope behavioral data is mated, gyroscope behavioral data corresponding under extracting each contact action.
3rd step, generates distance feature vector.For each user, extract gyroscope behavioural characteristic vector in each contact action process, and choose reference feature vector, obtain distance feature vector after comparison behavioural characteristic vector sum reference feature vector, form training characteristics set.
4th step, Model of Identity Authentication System builds.For each user, be positive class by the training characteristics data markers of this user, adopt single category support vector machines to build the Model of Identity Authentication System of validated user, and utilize training characteristics the set pair analysis model to learn.
5th step, generates test data.For each user, require that its mode according to Fig. 4 carries out contact action, repeat 20 times, obtain test data set.
6th step, the certification of user identity legitimacy.Select a certain user as validated user, for wherein each test sample book, generation distance feature vector, it can be used as the input of this authenticating user identification model, obtain the detected value of authentication, and this detected value is compared with threshold value σ (σ is set as 0.55), if detected value is less than threshold value σ, then judge that this user is as disabled user; Otherwise, then judge that this user is as valid operation.
7th step, selects remaining users successively as validated user, repeats the process of above-mentioned 6th step, obtain user's average authentication result used.
For all users, test the inventive method carries out the accuracy of certification to smart phone user identity.Fig. 5 is average Receiver Operating Characteristics (the ReceiverOperating Characteristic of the present embodiment smart phone user, ROC) curve, horizontal ordinate is false acceptance rate (False-Acceptance Rate, FAR), the disabled user's sample number being judged to validated user when representing row authentication accounts for the number percent of disabled user's total sample number of test, is used for weighing disabled user and is determined as the probability of validated user by checking mistakenly; Ordinate is false rejection rate (False-Rejection Rate, FRR), the validated user sample number being judged to disabled user when representing and carry out authentication accounts for the number percent of the validated user total sample number of test, is used for weighing validated user and is determined as the probability of disabled user's refusal by checking mistakenly.
As can be seen from illustrated experimental result, the inventive method can carry out certification to the identity of smart phone user exactly.When FAR is 8.32%, FRR is 3.75%; When FAR is 2.14%, FRR is 7.28%; When FAR and FRR is equal, the error rate such as average of authentication is 5.78%.The above results demonstrates feasibility of the present invention and validity, shows that the method can be used as the identification safety authentication technology of a kind of efficient smart machine user.

Claims (4)

1., based on a smart phone user identity identifying method for gyroscope behavioural characteristic, it is characterized in that, by train and certification two parts are formed, wherein:
Described training department divides and comprises the steps:
(1) behavioral data that repeatedly formed in contact action process of gyroscope collection recording user, forms training data;
(2) for the behavioral data that each gyroscope records, the gyroscope behavioral data that contact action is corresponding is extracted;
(3) for the gyroscope behavioral data that contact action is corresponding, extract behavioural characteristic vector, obtain reference feature vector wherein, calculate behavioural characteristic vector and the distance of reference feature vector, obtain distance feature vector, form training characteristics set;
(4) adopt single classifier to set up the Model of Identity Authentication System of user, be that positive class is trained Model of Identity Authentication System by the training characteristics aggregated label of validated user, obtain the judging identity threshold value of validated user;
Described authentication section comprises the steps:
(1) when certification, gyroscope obtains the behavioral data that user's contact action identical with training produces, and extracts the gyroscope behavioral data that contact action is corresponding;
(2) for the gyroscope behavioral data that contact action is corresponding, extract behavioural characteristic vector, the reference feature vector obtained when training with the authentication model described in training part carries out distance metric, obtains distance feature vector;
(3) using vectorial for this distance feature input as Model of Identity Authentication System, obtain the detected value of authentication, and this detected value and judging identity threshold value are compared, and then judge the legitimacy of user identity.
2. the smart phone user identity identifying method based on gyroscope behavioural characteristic according to claim 1, it is characterized in that, the gyroscope behavioral data that described extraction contact action is corresponding refers to for each contact action, extract contact action when starting and at the end of time, obtain the time interval of contact action, and this time interval is mated with the behavioral data timestamp of gyroscope record, gyroscope behavioral data corresponding under obtaining each contact action.
3. the smart phone user identity identifying method based on gyroscope behavioural characteristic according to claim 1, it is characterized in that, the described gyroscope behavioral data corresponding for contact action, the concrete grammar extracting behavioural characteristic vector is: extract for gyroscope behavioral data corresponding to contact action, comprise statistical nature and distance feature, specific as follows:
Statistical nature refers to the statistics description amount of the gyroscope behavioral data that each contact action is corresponding, comprising:
Difference, coefficient of kurtosis, the coefficient of skewness of the maximal value of X-axis angular velocity, minimum value, average, intermediate value, standard deviation, 75% fractile and 25% fractile;
Difference, coefficient of kurtosis, the coefficient of skewness of the maximal value of Y-axis angular velocity, minimum value, average, intermediate value, standard deviation, 75% fractile and 25% fractile;
Difference, coefficient of kurtosis, the coefficient of skewness of the maximal value of Z axis angular velocity, minimum value, average, intermediate value, standard deviation, 75% fractile and 25% fractile;
Distance feature refers to the distance metric on identical contact action between gyroscope behavioral data and reference behavioral data, and its concrete calculation procedure is:
1) in identical contact action corresponding gyroscope Behavioral training data, comprise and organize sample data more, adopt dynamic time warping to calculate often to organize sample data and other organizes distance between sample data, obtain distance sum after cumulative, the minimum gyroscope sample data of chosen distance sum is as with reference to behavioral data;
2) adopt the distance of dynamic time warping calculating on each identical contact action between gyroscope behavioral data and reference behavioral data, obtain distance feature.
4. the smart phone user identity identifying method based on gyroscope behavioural characteristic according to claim 1, it is characterized in that, the acquisition of described reference feature vector refers in the gyroscope behavioral data that contact action is corresponding, manhatton distance is adopted to calculate the distance of each behavioural characteristic vector to other behavioural characteristic vector, form the distance vector that this proper vector is corresponding, the minimum proper vector of chosen distance vector mould is as with reference to proper vector.
CN201410641806.9A 2014-11-13 2014-11-13 Smart phone user identity identifying method based on gyroscope behavioural characteristic Active CN104408341B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410641806.9A CN104408341B (en) 2014-11-13 2014-11-13 Smart phone user identity identifying method based on gyroscope behavioural characteristic

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410641806.9A CN104408341B (en) 2014-11-13 2014-11-13 Smart phone user identity identifying method based on gyroscope behavioural characteristic

Publications (2)

Publication Number Publication Date
CN104408341A true CN104408341A (en) 2015-03-11
CN104408341B CN104408341B (en) 2017-06-27

Family

ID=52645972

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410641806.9A Active CN104408341B (en) 2014-11-13 2014-11-13 Smart phone user identity identifying method based on gyroscope behavioural characteristic

Country Status (1)

Country Link
CN (1) CN104408341B (en)

Cited By (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104765995A (en) * 2015-04-24 2015-07-08 福建师范大学 Intelligent device identity authentication method and client side based on touch screen operation
CN104765453A (en) * 2015-03-29 2015-07-08 中国海洋大学 Built-in three-dimensional accelerometer based identity authentication method of handheld device
CN104850773A (en) * 2015-05-14 2015-08-19 西安交通大学 User identity authentication method for intelligent mobile terminal
CN104992089A (en) * 2015-07-23 2015-10-21 广东欧珀移动通信有限公司 Security verification method and system based on touch screen technology
CN105068743A (en) * 2015-06-12 2015-11-18 西安交通大学 Mobile terminal user identity authentication method based on multi-finger touch behavior characteristics
CN105912910A (en) * 2016-04-21 2016-08-31 武汉理工大学 Cellphone sensing based online signature identity authentication method and system
CN106022034A (en) * 2015-03-30 2016-10-12 辛纳普蒂克斯公司 Systems and methods for biometric authentication
CN106204039A (en) * 2016-06-30 2016-12-07 宇龙计算机通信科技(深圳)有限公司 A kind of safe payment method and system
CN106331363A (en) * 2016-09-09 2017-01-11 常州大学 Blind identification and guiding-type blind guiding method based on intelligent mobile phone
CN107026928A (en) * 2017-05-24 2017-08-08 武汉大学 A kind of behavioural characteristic identification authentication method and device based on mobile phone sensor
CN107153780A (en) * 2017-05-05 2017-09-12 西安交通大学苏州研究院 The writing behavioural characteristic authentication method of electronic equipment is dressed based on wrist
CN107194219A (en) * 2017-06-16 2017-09-22 西安电子科技大学 Intelligent terminal identity identifying method based on similarity
CN107194213A (en) * 2016-03-14 2017-09-22 阿里巴巴集团控股有限公司 A kind of personal identification method and device
CN107194216A (en) * 2017-05-05 2017-09-22 中南大学 A kind of mobile identity identifying method and system of the custom that swiped based on user
CN107273728A (en) * 2017-05-05 2017-10-20 西安交通大学苏州研究院 Intelligent watch unblock and authentication method based on motion-sensing behavioural characteristic
CN107516218A (en) * 2017-09-30 2017-12-26 北京梆梆安全科技有限公司 A kind of user ID authentication method and device based on multiple features
CN108370509A (en) * 2015-12-03 2018-08-03 开利公司 Utilize the Verification System of kinematic parameter
CN104966016B (en) * 2015-06-12 2018-09-04 西安交通大学 Mobile terminal child user cooperatively judges and the method for limitation operating right
CN108549806A (en) * 2018-04-11 2018-09-18 西安电子科技大学 The identity identifying method of behavior is slided and clicked based on user
CN108600237A (en) * 2018-04-28 2018-09-28 北京京东金融科技控股有限公司 Identity identifying method, device and medium
CN108664785A (en) * 2018-04-04 2018-10-16 浙江大学 A kind of device-fingerprint extraction and authentication method based on CPU module electromagnetic radiation
CN108683503A (en) * 2018-04-17 2018-10-19 西京学院 A kind of dynamic ID identification authentication method based on sound wave
CN109068009A (en) * 2018-10-26 2018-12-21 北京交通大学 The implicit identity identifying method of smart phone based on context detection
CN109684812A (en) * 2018-12-29 2019-04-26 西安电子科技大学 A kind of lasting identity identifying method of mobile device acquisition user movement behavior
CN110324350A (en) * 2019-07-09 2019-10-11 中国工商银行股份有限公司 Identity identifying method and server based on the non-sensitive sensing data in mobile terminal
CN110418337A (en) * 2019-07-29 2019-11-05 北京邮电大学 Identity identifying method and device
CN110414196A (en) * 2019-07-29 2019-11-05 深圳大学 A kind of smartwatch auth method based on vibration signal
CN110472389A (en) * 2019-07-31 2019-11-19 南京大学 Identity authorization system and its working method based on touch control gesture
CN112699971A (en) * 2021-03-25 2021-04-23 荣耀终端有限公司 Identity authentication method and device
WO2021204086A1 (en) * 2020-04-06 2021-10-14 华为技术有限公司 Identity authentication method, and method and device for training identity authentication model
CN115174220A (en) * 2022-07-06 2022-10-11 四川九洲空管科技有限责任公司 Physical layer security authentication method based on dynamic time warping

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100328074A1 (en) * 2009-06-30 2010-12-30 Johnson Erik J Human presence detection techniques
CN103238156A (en) * 2011-04-15 2013-08-07 株式会社Ntt都科摩 Portable terminal, and grip characteristic learning method
CN103269400A (en) * 2013-05-14 2013-08-28 深迪半导体(上海)有限公司 Method for turning over system screen of mobile communication equipment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100328074A1 (en) * 2009-06-30 2010-12-30 Johnson Erik J Human presence detection techniques
CN103238156A (en) * 2011-04-15 2013-08-07 株式会社Ntt都科摩 Portable terminal, and grip characteristic learning method
CN103269400A (en) * 2013-05-14 2013-08-28 深迪半导体(上海)有限公司 Method for turning over system screen of mobile communication equipment

Cited By (43)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104765453B (en) * 2015-03-29 2017-06-27 中国海洋大学 A kind of identity identifying method of the handheld device based on embedded three-dimensional accelerometer
CN104765453A (en) * 2015-03-29 2015-07-08 中国海洋大学 Built-in three-dimensional accelerometer based identity authentication method of handheld device
CN106022034A (en) * 2015-03-30 2016-10-12 辛纳普蒂克斯公司 Systems and methods for biometric authentication
CN106022034B (en) * 2015-03-30 2021-05-04 辛纳普蒂克斯公司 System and method for biometric authentication
CN104765995A (en) * 2015-04-24 2015-07-08 福建师范大学 Intelligent device identity authentication method and client side based on touch screen operation
CN104850773B (en) * 2015-05-14 2018-08-10 西安交通大学 Method for authenticating user identity for intelligent mobile terminal
CN104850773A (en) * 2015-05-14 2015-08-19 西安交通大学 User identity authentication method for intelligent mobile terminal
CN105068743A (en) * 2015-06-12 2015-11-18 西安交通大学 Mobile terminal user identity authentication method based on multi-finger touch behavior characteristics
CN105068743B (en) * 2015-06-12 2018-07-17 西安交通大学 Based on the mobile terminal user identity authentication method for more referring to touch-control behavioural characteristic
CN104966016B (en) * 2015-06-12 2018-09-04 西安交通大学 Mobile terminal child user cooperatively judges and the method for limitation operating right
CN104992089A (en) * 2015-07-23 2015-10-21 广东欧珀移动通信有限公司 Security verification method and system based on touch screen technology
CN108370509A (en) * 2015-12-03 2018-08-03 开利公司 Utilize the Verification System of kinematic parameter
CN107194213B (en) * 2016-03-14 2020-03-27 阿里巴巴集团控股有限公司 Identity recognition method and device
CN107194213A (en) * 2016-03-14 2017-09-22 阿里巴巴集团控股有限公司 A kind of personal identification method and device
CN105912910A (en) * 2016-04-21 2016-08-31 武汉理工大学 Cellphone sensing based online signature identity authentication method and system
CN106204039A (en) * 2016-06-30 2016-12-07 宇龙计算机通信科技(深圳)有限公司 A kind of safe payment method and system
CN106331363A (en) * 2016-09-09 2017-01-11 常州大学 Blind identification and guiding-type blind guiding method based on intelligent mobile phone
CN106331363B (en) * 2016-09-09 2019-03-22 常州大学 A method of blind person's identification and guiding guide based on smart phone
CN107273728A (en) * 2017-05-05 2017-10-20 西安交通大学苏州研究院 Intelligent watch unblock and authentication method based on motion-sensing behavioural characteristic
CN107273728B (en) * 2017-05-05 2020-11-03 西安交通大学苏州研究院 Smart watch unlocking and authentication method based on motion sensing behavior characteristics
CN107194216A (en) * 2017-05-05 2017-09-22 中南大学 A kind of mobile identity identifying method and system of the custom that swiped based on user
CN107153780A (en) * 2017-05-05 2017-09-12 西安交通大学苏州研究院 The writing behavioural characteristic authentication method of electronic equipment is dressed based on wrist
CN107026928A (en) * 2017-05-24 2017-08-08 武汉大学 A kind of behavioural characteristic identification authentication method and device based on mobile phone sensor
CN107194219A (en) * 2017-06-16 2017-09-22 西安电子科技大学 Intelligent terminal identity identifying method based on similarity
CN107516218A (en) * 2017-09-30 2017-12-26 北京梆梆安全科技有限公司 A kind of user ID authentication method and device based on multiple features
CN108664785A (en) * 2018-04-04 2018-10-16 浙江大学 A kind of device-fingerprint extraction and authentication method based on CPU module electromagnetic radiation
CN108664785B (en) * 2018-04-04 2020-12-08 浙江大学 Equipment fingerprint extraction and authentication method based on CPU module electromagnetic radiation
CN108549806A (en) * 2018-04-11 2018-09-18 西安电子科技大学 The identity identifying method of behavior is slided and clicked based on user
CN108549806B (en) * 2018-04-11 2020-01-31 西安电子科技大学 Identity authentication method based on user sliding and clicking behaviors
CN108683503A (en) * 2018-04-17 2018-10-19 西京学院 A kind of dynamic ID identification authentication method based on sound wave
CN108683503B (en) * 2018-04-17 2021-11-16 西京学院 Dynamic identity recognition and authentication method based on sound waves
CN108600237A (en) * 2018-04-28 2018-09-28 北京京东金融科技控股有限公司 Identity identifying method, device and medium
CN109068009A (en) * 2018-10-26 2018-12-21 北京交通大学 The implicit identity identifying method of smart phone based on context detection
CN109684812B (en) * 2018-12-29 2021-09-03 西安电子科技大学 Continuous identity authentication method for mobile equipment to acquire user motion behaviors
CN109684812A (en) * 2018-12-29 2019-04-26 西安电子科技大学 A kind of lasting identity identifying method of mobile device acquisition user movement behavior
CN110324350A (en) * 2019-07-09 2019-10-11 中国工商银行股份有限公司 Identity identifying method and server based on the non-sensitive sensing data in mobile terminal
CN110324350B (en) * 2019-07-09 2021-12-07 中国工商银行股份有限公司 Identity authentication method and server based on mobile terminal non-sensitive sensor data
CN110414196A (en) * 2019-07-29 2019-11-05 深圳大学 A kind of smartwatch auth method based on vibration signal
CN110418337A (en) * 2019-07-29 2019-11-05 北京邮电大学 Identity identifying method and device
CN110472389A (en) * 2019-07-31 2019-11-19 南京大学 Identity authorization system and its working method based on touch control gesture
WO2021204086A1 (en) * 2020-04-06 2021-10-14 华为技术有限公司 Identity authentication method, and method and device for training identity authentication model
CN112699971A (en) * 2021-03-25 2021-04-23 荣耀终端有限公司 Identity authentication method and device
CN115174220A (en) * 2022-07-06 2022-10-11 四川九洲空管科技有限责任公司 Physical layer security authentication method based on dynamic time warping

Also Published As

Publication number Publication date
CN104408341B (en) 2017-06-27

Similar Documents

Publication Publication Date Title
CN104408341A (en) Smart phone user identity authentication method based on gyroscope behavior characteristics
Buschek et al. Improving accuracy, applicability and usability of keystroke biometrics on mobile touchscreen devices
Stanciu et al. On the effectiveness of sensor-enhanced keystroke dynamics against statistical attacks
CN108229130B (en) Verification method and device
Shahzad et al. Secure unlocking of mobile touch screen devices by simple gestures: You can see it but you can not do it
EP3100152B1 (en) User-authentication gestures
Xu et al. Towards continuous and passive authentication via touch biometrics: An experimental study on smartphones
Serwadda et al. When kids' toys breach mobile phone security
EP3497621B1 (en) Identifying one or more users based on typing pattern and/or behaviour
Li et al. Unobservable re-authentication for smartphones.
Muaaz et al. An analysis of different approaches to gait recognition using cell phone based accelerometers
CN104809377B (en) Network user identity monitoring method based on webpage input behavior feature
Lu et al. Safeguard: User reauthentication on smartphones via behavioral biometrics
Serwadda et al. Examining a large keystroke biometrics dataset for statistical-attack openings
US10965671B2 (en) Authenticating a user
CN103677644A (en) Unlocking method and system for smart mobile terminal
CN102946481A (en) Method and system for unlocking human face expression
CN107153780B (en) Writing behavior feature authentication method based on wrist wearable electronic equipment
US9202035B1 (en) User authentication based on biometric handwriting aspects of a handwritten code
Wang et al. Sensor-based user authentication
CN105212942A (en) Utilize the Verification System of Biont information
CN107273728B (en) Smart watch unlocking and authentication method based on motion sensing behavior characteristics
JP6745009B1 (en) Authentication system, authentication device, authentication method, and program
Wang et al. Towards DTW-based unlock scheme using handwritten graphics on smartphones
CN104915585A (en) Sensor characteristic sub-area modeling-based monitor method for user identity of touch screen equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant