CN104408341A - Smart phone user identity authentication method based on gyroscope behavior characteristics - Google Patents
Smart phone user identity authentication method based on gyroscope behavior characteristics Download PDFInfo
- Publication number
- CN104408341A CN104408341A CN201410641806.9A CN201410641806A CN104408341A CN 104408341 A CN104408341 A CN 104408341A CN 201410641806 A CN201410641806 A CN 201410641806A CN 104408341 A CN104408341 A CN 104408341A
- Authority
- CN
- China
- Prior art keywords
- gyroscope
- contact action
- behavioral data
- distance
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
Abstract
The invention discloses a smart phone user identity authentication method based on gyroscope behavior characteristics. The method comprises the following steps: extracting sensor behavior data corresponding to different operation events according to time information of screen touch operation by analyzing gyroscope behavior data generated during screen touch operation of a smart phone user to generate sensor behavior characteristics; establishing an identity authentication model of the user based on the behavior characteristics; performing identity authentication on the smart phone user. The method disclosed by the invention has the advantages that the method is easy to operate, and any additional equipment does not need to be added; the behavior characteristics of the mobile phone user in an authentication process are described by using gyroscope operation behaviors on the basis of not changing the user habit to lay a basis for user identity judgment, so that smear attack and observation attack can be effectively prevented, and extensive safety and adaptability are achieved.
Description
Technical field
The present invention relates to smart phone user authentication, particularly a kind of smart phone user identity identifying method utilizing mobile phone sensor data.
Background technology
Along with the fast development of mobile Internet, smart mobile phone penetrates into all trades and professions, affects each details of people's live and work.The significant data (as account password) that smart mobile phone record is more and more many with store mobile subscriber and privacy information (as note and video).Particularly a large amount of use of mobile-phone payment related application in recent years and the frequent generation of privacy compromise event, makes the safety protection problem of people to smart mobile phone more and more pay close attention to.
Authentication is safely and effectively the key problem of carrying out smart mobile phone safeguard protection, refers to that user is when accessing intelligent mobile phone system or accessing the system resource of different protection level, the process whether identity of this user of system validation is legal.Authentication mode at present for smart mobile phone mainly contains three kinds: 1) PIN password, 2) graphical passwords, 3) fingerprint.For the mode of PIN password, be easy to realize and simple and convenient, but easily pass into silence or be stolen; For the mode of graphical passwords (user need on the dot matrix of 3x3 according to some points that is necessarily linked in sequence as password), be easy to memory, but touch screen vestige and finger motion are easily observed causes guessing attack; For fingerprint recognition mode, although accuracy is high, need special hardware supported.
Summary of the invention
The action behavior utilizing smart phone user to represent in contact action process can as the good means of one replacing or strengthen PIN password/graphical passwords/finger print identifying as the foundation of authentication, simultaneously because mobile phone sensor (as accelerometer or gyroscope) is as built-in device intrinsic in smart mobile phone, can be directly, exactly the action behavior in user's contact action process is reflected and measured, the action behavior of mobile phone gyroscope behavioral data to user that user therefore can be adopted caused when contact action is measured, and in this, as the foundation of authenticating user identification.Compared with the authentication mode of aforementioned three kinds of current popular, gyroscope behavioural characteristic is used to carry out authentication: can not forget and lose, not easily stolen by others and forgery; Simple to operate, do not need special hardware supported, and cost is very low, easily promotes on a large scale; In addition, effectively can prevent from stain from attacking and observe attacking, there is security widely and applicability.
The object of this invention is to provide a kind of smart phone user identity identifying method based on mobile phone sensor data, particularly utilize user in contact action process by the behavioural characteristic of gyroscope record to judge the method for user identity legitimacy.
For reaching above object, the present invention adopts following technical scheme to realize:
Based on a smart phone user identity identifying method for gyroscope behavioural characteristic, it is characterized in that, by train and certification two parts are formed, wherein:
Described training department divides and comprises the steps:
(1) behavioral data that repeatedly formed in contact action process of gyroscope collection recording user, forms training data;
(2) for the behavioral data that each gyroscope records, the gyroscope behavioral data that contact action is corresponding is extracted;
(3) for the gyroscope behavioral data that contact action is corresponding, extract behavioural characteristic vector, obtain reference feature vector wherein, calculate behavioural characteristic vector and the distance of reference feature vector, obtain distance feature vector, form training characteristics set;
(4) adopt single classifier to set up the Model of Identity Authentication System of user, be that positive class is trained Model of Identity Authentication System by the training characteristics aggregated label of validated user, obtain the judging identity threshold value of validated user;
Described authentication section comprises the steps:
(1) when certification, gyroscope obtains the behavioral data that user's contact action identical with training produces, and extracts the gyroscope behavioral data that contact action is corresponding;
(2) for the gyroscope behavioral data that contact action is corresponding, extract behavioural characteristic vector, the reference feature vector obtained when training with the authentication model described in training part carries out distance metric, obtains distance feature vector;
(3) using vectorial for this distance feature input as Model of Identity Authentication System, obtain the detected value of authentication, and this detected value and judging identity threshold value are compared, and then judge the legitimacy of user identity.
In said method, the gyroscope behavioral data that described extraction contact action is corresponding refers to for each contact action, extract contact action when starting and at the end of time, obtain the time interval of contact action, and this time interval is mated with the behavioral data timestamp of gyroscope record, gyroscope behavioral data corresponding under obtaining each contact action.
The described gyroscope behavioral data corresponding for contact action, the concrete grammar extracting behavioural characteristic vector is: extract for gyroscope behavioral data corresponding to contact action, comprise statistical nature and distance feature, specific as follows:
Statistical nature refers to the statistics description amount of the gyroscope behavioral data that each contact action is corresponding, comprising:
Difference, coefficient of kurtosis, the coefficient of skewness of the maximal value of X-axis angular velocity, minimum value, average, intermediate value, standard deviation, 75% fractile and 25% fractile;
Difference, coefficient of kurtosis, the coefficient of skewness of the maximal value of Y-axis angular velocity, minimum value, average, intermediate value, standard deviation, 75% fractile and 25% fractile;
Difference, coefficient of kurtosis, the coefficient of skewness of the maximal value of Z axis angular velocity, minimum value, average, intermediate value, standard deviation, 75% fractile and 25% fractile;
Distance feature refers to the distance metric on identical contact action between gyroscope behavioral data and reference behavioral data, and its concrete calculation procedure is:
1) in identical contact action corresponding gyroscope Behavioral training data, comprise and organize sample data more, adopt dynamic time warping to calculate often to organize sample data and other organizes distance between sample data, obtain distance sum after cumulative, the minimum gyroscope sample data of chosen distance sum is as with reference to behavioral data;
2) adopt the distance of dynamic time warping calculating on each identical contact action between gyroscope behavioral data and reference behavioral data, obtain distance feature.
The acquisition of described reference feature vector refers in the gyroscope behavioral data that contact action is corresponding, manhatton distance is adopted to calculate the distance of each behavioural characteristic vector to other behavioural characteristic vector, form the distance vector that this proper vector is corresponding, the minimum proper vector of chosen distance vector mould is as with reference to proper vector.
The advantage of the inventive method is: gyroscope behavioural characteristic is without the need to memory and carry, not easily stolen by others and forgery; Simple to operate, without the need to increasing any extras; The behavioral trait basis not changing user habit using gyroscope operation behavior describe cellphone subscriber to embody in verification process, in this, as the foundation that user identity judges, effectively can prevent from stain from attacking and observe attacking, there is security widely and applicability.In addition, adopt the character representation method of distance metric effectively can reduce the impact of behavior fluctuation, improve the robustness of authentication significantly.
Accompanying drawing explanation
Below in conjunction with the drawings and the specific embodiments, the present invention is described in further detail.
Fig. 1 is the overall procedure schematic diagram of the inventive method.
Fig. 2 is the idiographic flow schematic diagram of the gyroscope behavioral data extraction that in the inventive method, contact action is corresponding.
Fig. 3 is the idiographic flow schematic diagram of gyroscope behavior distance feature vector extracting method in the inventive method.
Fig. 4 is the screenshotss photo adopting the present invention to carry out the experimental implementation of smart phone user authentication.
Fig. 5 is the experimental result picture adopting the present invention to carry out smart phone user authentication.
Embodiment
See Fig. 1, a kind of smart phone user identity identifying method based on gyroscope behavioural characteristic, can be used for touch-screen equipment operator identity legitimacy and carries out certification, realizes the security protection of individual to touch-screen equipment storage inside and sensitive information.The present invention comprises Model of Identity Authentication System training and operator's authentication two parts, and concrete implementation step is as follows:
1) Model of Identity Authentication System training department divides and comprises the steps:
(1) the gyroscope behavioral data in the click repeatedly in fixing touch screen position of gyroscope collection recording user and slide (contact action) process, obtains training dataset; The form of gyroscope behavioral data is: { angular velocity of horizontal right direction (X-axis), the vertically upward angular velocity of direction (Y-axis), the angular velocity in screen front face normal will direction (Z axis), timestamp }.
(2) for the behavioral data that each gyroscope records, the gyroscope behavioral data (see Fig. 2) that contact action is corresponding is extracted.Be specially:
The first step, during extraction contact action, finger contact and the time leaving touch-screen, obtain the time interval of contact action;
Second step, mates the timestamp of the time interval of each contact action with gyroscope behavioral data, gyroscope behavioral data corresponding under obtaining each contact action.
(3) for the gyroscope behavioral data that contact action is corresponding, extraction behavioural characteristic vector, obtains reference feature vector wherein, calculates the distance of behavioural characteristic vector and reference feature vector, obtain distance feature vector, form training characteristics set (see Fig. 3).Be specially:
The first step, the gyroscope behavioral data that in each contact action process, contact action is corresponding is concentrated for training data, extract gyroscope behavioural characteristic vector, being specially contact action causes smart mobile phone to rock derived a series of gyroscope behavior measures, comprises statistical nature and distance feature two class.Wherein, statistical nature refers to the statistics description amount of the gyroscope behavioral data that each contact action is corresponding, comprises difference, coefficient of kurtosis, the coefficient of skewness of X-axis, Y-axis, the maximal value of Z axis angular velocity, minimum value, average, intermediate value, standard deviation, 75% fractile and 25% fractile; Distance feature refers to gyroscope behavioral data on identical contact action and with reference to the distance metric between behavioral data, its concrete calculation procedure is: first, in identical contact action corresponding gyroscope Behavioral training data, employing dynamic time warping calculates the distance between each gyroscope sample data and other gyroscope sample data, obtain distance sum after cumulative, the minimum gyroscope sample data of chosen distance sum is as with reference to behavioral data; Then, adopt the distance of dynamic time warping calculating on each identical contact action between gyroscope behavioral data and reference behavioral data, obtain distance feature;
Suppose that validated user training acquires n group data, use DTW (dynamic time warping) to calculate the distance sum of certain group data and other n-1 group data vectors respectively.Choose minimum with other n-1 group data Euclidean distances one group as with reference to sample;
Second step, adopt Euclidean distance to calculate gyroscope behavioural characteristic vector and the distance of other gyroscope behavioural characteristic vector in training set in each contact action process, obtain the distance vector (wherein P represent the number of times of in training set contact action process) of dimension for (P-1); Calculation training concentrates the mould of each distance vector, and the gyroscope behavior vector selecting modulus value minimum is as vectorial with reference to behavioural characteristic;
3rd step, manhatton distance is adopted to calculate gyroscope behavioural characteristic vector and the difference value vector with reference to behavior proper vector in each contact action process, as the distance feature vector of gyroscope behavioral data in each contact action process, form gyroscope Behavioral training feature set;
(4) one-class classifier is adopted to set up the Model of Identity Authentication System of validated user, be that positive class is trained Model of Identity Authentication System by the training characteristics aggregated label of validated user, obtain the judging identity threshold value σ (σ chooses according to the precision of model training) of validated user;
2) operator's identity continues authentication section, comprises the steps:
(1) when certification, gyroscope obtains the behavioral data that user's contact action identical with training produces, and extracts the gyroscope behavioral data that contact action is corresponding;
(2) for the gyroscope behavioral data that contact action is corresponding, extract behavioural characteristic vector, the reference feature vector obtained when training with the authentication model described in training part carries out distance metric, obtains distance feature vector;
(3) using the input of this distance feature vector as Model of Identity Authentication System, obtain the detected value of authentication, and by this detected value and validated user judging identity threshold value σ compare, if detected value is greater than threshold value, then the active user judged is as disabled user; If detected value is less than threshold value, then judge that active user is as validated user;
The experiment of smart phone user authentication is carried out according to the present invention
The present invention has carried out experimental verification for the authentication of smart phone user, and concrete steps are as follows:
The first step, generating training data.Requirement of experiment 10 users carry out contact action according to the mode of Fig. 4 respectively on smart mobile phone, repeat 30 times, comprise 3 touch screen clicking operation and 4 touch screen slides at every turn, gather and record gyroscope behavioral data when these users carry out aforesaid operations.In the mode shown in Fig. 4, user carries out touch screen clicking operation on point one, two, three, between point four, five, six, seven, eight, carry out touch screen slide.
Second step, extracts the gyroscope behavioral data that contact action is corresponding in each contact action process.For each user, extract contact action when starting and at the end of time, obtain the time interval that each contact action is corresponding; The timestamp of the time interval of each contact action with gyroscope behavioral data is mated, gyroscope behavioral data corresponding under extracting each contact action.
3rd step, generates distance feature vector.For each user, extract gyroscope behavioural characteristic vector in each contact action process, and choose reference feature vector, obtain distance feature vector after comparison behavioural characteristic vector sum reference feature vector, form training characteristics set.
4th step, Model of Identity Authentication System builds.For each user, be positive class by the training characteristics data markers of this user, adopt single category support vector machines to build the Model of Identity Authentication System of validated user, and utilize training characteristics the set pair analysis model to learn.
5th step, generates test data.For each user, require that its mode according to Fig. 4 carries out contact action, repeat 20 times, obtain test data set.
6th step, the certification of user identity legitimacy.Select a certain user as validated user, for wherein each test sample book, generation distance feature vector, it can be used as the input of this authenticating user identification model, obtain the detected value of authentication, and this detected value is compared with threshold value σ (σ is set as 0.55), if detected value is less than threshold value σ, then judge that this user is as disabled user; Otherwise, then judge that this user is as valid operation.
7th step, selects remaining users successively as validated user, repeats the process of above-mentioned 6th step, obtain user's average authentication result used.
For all users, test the inventive method carries out the accuracy of certification to smart phone user identity.Fig. 5 is average Receiver Operating Characteristics (the ReceiverOperating Characteristic of the present embodiment smart phone user, ROC) curve, horizontal ordinate is false acceptance rate (False-Acceptance Rate, FAR), the disabled user's sample number being judged to validated user when representing row authentication accounts for the number percent of disabled user's total sample number of test, is used for weighing disabled user and is determined as the probability of validated user by checking mistakenly; Ordinate is false rejection rate (False-Rejection Rate, FRR), the validated user sample number being judged to disabled user when representing and carry out authentication accounts for the number percent of the validated user total sample number of test, is used for weighing validated user and is determined as the probability of disabled user's refusal by checking mistakenly.
As can be seen from illustrated experimental result, the inventive method can carry out certification to the identity of smart phone user exactly.When FAR is 8.32%, FRR is 3.75%; When FAR is 2.14%, FRR is 7.28%; When FAR and FRR is equal, the error rate such as average of authentication is 5.78%.The above results demonstrates feasibility of the present invention and validity, shows that the method can be used as the identification safety authentication technology of a kind of efficient smart machine user.
Claims (4)
1., based on a smart phone user identity identifying method for gyroscope behavioural characteristic, it is characterized in that, by train and certification two parts are formed, wherein:
Described training department divides and comprises the steps:
(1) behavioral data that repeatedly formed in contact action process of gyroscope collection recording user, forms training data;
(2) for the behavioral data that each gyroscope records, the gyroscope behavioral data that contact action is corresponding is extracted;
(3) for the gyroscope behavioral data that contact action is corresponding, extract behavioural characteristic vector, obtain reference feature vector wherein, calculate behavioural characteristic vector and the distance of reference feature vector, obtain distance feature vector, form training characteristics set;
(4) adopt single classifier to set up the Model of Identity Authentication System of user, be that positive class is trained Model of Identity Authentication System by the training characteristics aggregated label of validated user, obtain the judging identity threshold value of validated user;
Described authentication section comprises the steps:
(1) when certification, gyroscope obtains the behavioral data that user's contact action identical with training produces, and extracts the gyroscope behavioral data that contact action is corresponding;
(2) for the gyroscope behavioral data that contact action is corresponding, extract behavioural characteristic vector, the reference feature vector obtained when training with the authentication model described in training part carries out distance metric, obtains distance feature vector;
(3) using vectorial for this distance feature input as Model of Identity Authentication System, obtain the detected value of authentication, and this detected value and judging identity threshold value are compared, and then judge the legitimacy of user identity.
2. the smart phone user identity identifying method based on gyroscope behavioural characteristic according to claim 1, it is characterized in that, the gyroscope behavioral data that described extraction contact action is corresponding refers to for each contact action, extract contact action when starting and at the end of time, obtain the time interval of contact action, and this time interval is mated with the behavioral data timestamp of gyroscope record, gyroscope behavioral data corresponding under obtaining each contact action.
3. the smart phone user identity identifying method based on gyroscope behavioural characteristic according to claim 1, it is characterized in that, the described gyroscope behavioral data corresponding for contact action, the concrete grammar extracting behavioural characteristic vector is: extract for gyroscope behavioral data corresponding to contact action, comprise statistical nature and distance feature, specific as follows:
Statistical nature refers to the statistics description amount of the gyroscope behavioral data that each contact action is corresponding, comprising:
Difference, coefficient of kurtosis, the coefficient of skewness of the maximal value of X-axis angular velocity, minimum value, average, intermediate value, standard deviation, 75% fractile and 25% fractile;
Difference, coefficient of kurtosis, the coefficient of skewness of the maximal value of Y-axis angular velocity, minimum value, average, intermediate value, standard deviation, 75% fractile and 25% fractile;
Difference, coefficient of kurtosis, the coefficient of skewness of the maximal value of Z axis angular velocity, minimum value, average, intermediate value, standard deviation, 75% fractile and 25% fractile;
Distance feature refers to the distance metric on identical contact action between gyroscope behavioral data and reference behavioral data, and its concrete calculation procedure is:
1) in identical contact action corresponding gyroscope Behavioral training data, comprise and organize sample data more, adopt dynamic time warping to calculate often to organize sample data and other organizes distance between sample data, obtain distance sum after cumulative, the minimum gyroscope sample data of chosen distance sum is as with reference to behavioral data;
2) adopt the distance of dynamic time warping calculating on each identical contact action between gyroscope behavioral data and reference behavioral data, obtain distance feature.
4. the smart phone user identity identifying method based on gyroscope behavioural characteristic according to claim 1, it is characterized in that, the acquisition of described reference feature vector refers in the gyroscope behavioral data that contact action is corresponding, manhatton distance is adopted to calculate the distance of each behavioural characteristic vector to other behavioural characteristic vector, form the distance vector that this proper vector is corresponding, the minimum proper vector of chosen distance vector mould is as with reference to proper vector.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410641806.9A CN104408341B (en) | 2014-11-13 | 2014-11-13 | Smart phone user identity identifying method based on gyroscope behavioural characteristic |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410641806.9A CN104408341B (en) | 2014-11-13 | 2014-11-13 | Smart phone user identity identifying method based on gyroscope behavioural characteristic |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104408341A true CN104408341A (en) | 2015-03-11 |
CN104408341B CN104408341B (en) | 2017-06-27 |
Family
ID=52645972
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410641806.9A Active CN104408341B (en) | 2014-11-13 | 2014-11-13 | Smart phone user identity identifying method based on gyroscope behavioural characteristic |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104408341B (en) |
Cited By (31)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104765995A (en) * | 2015-04-24 | 2015-07-08 | 福建师范大学 | Intelligent device identity authentication method and client side based on touch screen operation |
CN104765453A (en) * | 2015-03-29 | 2015-07-08 | 中国海洋大学 | Built-in three-dimensional accelerometer based identity authentication method of handheld device |
CN104850773A (en) * | 2015-05-14 | 2015-08-19 | 西安交通大学 | User identity authentication method for intelligent mobile terminal |
CN104992089A (en) * | 2015-07-23 | 2015-10-21 | 广东欧珀移动通信有限公司 | Security verification method and system based on touch screen technology |
CN105068743A (en) * | 2015-06-12 | 2015-11-18 | 西安交通大学 | Mobile terminal user identity authentication method based on multi-finger touch behavior characteristics |
CN105912910A (en) * | 2016-04-21 | 2016-08-31 | 武汉理工大学 | Cellphone sensing based online signature identity authentication method and system |
CN106022034A (en) * | 2015-03-30 | 2016-10-12 | 辛纳普蒂克斯公司 | Systems and methods for biometric authentication |
CN106204039A (en) * | 2016-06-30 | 2016-12-07 | 宇龙计算机通信科技(深圳)有限公司 | A kind of safe payment method and system |
CN106331363A (en) * | 2016-09-09 | 2017-01-11 | 常州大学 | Blind identification and guiding-type blind guiding method based on intelligent mobile phone |
CN107026928A (en) * | 2017-05-24 | 2017-08-08 | 武汉大学 | A kind of behavioural characteristic identification authentication method and device based on mobile phone sensor |
CN107153780A (en) * | 2017-05-05 | 2017-09-12 | 西安交通大学苏州研究院 | The writing behavioural characteristic authentication method of electronic equipment is dressed based on wrist |
CN107194219A (en) * | 2017-06-16 | 2017-09-22 | 西安电子科技大学 | Intelligent terminal identity identifying method based on similarity |
CN107194213A (en) * | 2016-03-14 | 2017-09-22 | 阿里巴巴集团控股有限公司 | A kind of personal identification method and device |
CN107194216A (en) * | 2017-05-05 | 2017-09-22 | 中南大学 | A kind of mobile identity identifying method and system of the custom that swiped based on user |
CN107273728A (en) * | 2017-05-05 | 2017-10-20 | 西安交通大学苏州研究院 | Intelligent watch unblock and authentication method based on motion-sensing behavioural characteristic |
CN107516218A (en) * | 2017-09-30 | 2017-12-26 | 北京梆梆安全科技有限公司 | A kind of user ID authentication method and device based on multiple features |
CN108370509A (en) * | 2015-12-03 | 2018-08-03 | 开利公司 | Utilize the Verification System of kinematic parameter |
CN104966016B (en) * | 2015-06-12 | 2018-09-04 | 西安交通大学 | Mobile terminal child user cooperatively judges and the method for limitation operating right |
CN108549806A (en) * | 2018-04-11 | 2018-09-18 | 西安电子科技大学 | The identity identifying method of behavior is slided and clicked based on user |
CN108600237A (en) * | 2018-04-28 | 2018-09-28 | 北京京东金融科技控股有限公司 | Identity identifying method, device and medium |
CN108664785A (en) * | 2018-04-04 | 2018-10-16 | 浙江大学 | A kind of device-fingerprint extraction and authentication method based on CPU module electromagnetic radiation |
CN108683503A (en) * | 2018-04-17 | 2018-10-19 | 西京学院 | A kind of dynamic ID identification authentication method based on sound wave |
CN109068009A (en) * | 2018-10-26 | 2018-12-21 | 北京交通大学 | The implicit identity identifying method of smart phone based on context detection |
CN109684812A (en) * | 2018-12-29 | 2019-04-26 | 西安电子科技大学 | A kind of lasting identity identifying method of mobile device acquisition user movement behavior |
CN110324350A (en) * | 2019-07-09 | 2019-10-11 | 中国工商银行股份有限公司 | Identity identifying method and server based on the non-sensitive sensing data in mobile terminal |
CN110418337A (en) * | 2019-07-29 | 2019-11-05 | 北京邮电大学 | Identity identifying method and device |
CN110414196A (en) * | 2019-07-29 | 2019-11-05 | 深圳大学 | A kind of smartwatch auth method based on vibration signal |
CN110472389A (en) * | 2019-07-31 | 2019-11-19 | 南京大学 | Identity authorization system and its working method based on touch control gesture |
CN112699971A (en) * | 2021-03-25 | 2021-04-23 | 荣耀终端有限公司 | Identity authentication method and device |
WO2021204086A1 (en) * | 2020-04-06 | 2021-10-14 | 华为技术有限公司 | Identity authentication method, and method and device for training identity authentication model |
CN115174220A (en) * | 2022-07-06 | 2022-10-11 | 四川九洲空管科技有限责任公司 | Physical layer security authentication method based on dynamic time warping |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100328074A1 (en) * | 2009-06-30 | 2010-12-30 | Johnson Erik J | Human presence detection techniques |
CN103238156A (en) * | 2011-04-15 | 2013-08-07 | 株式会社Ntt都科摩 | Portable terminal, and grip characteristic learning method |
CN103269400A (en) * | 2013-05-14 | 2013-08-28 | 深迪半导体(上海)有限公司 | Method for turning over system screen of mobile communication equipment |
-
2014
- 2014-11-13 CN CN201410641806.9A patent/CN104408341B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100328074A1 (en) * | 2009-06-30 | 2010-12-30 | Johnson Erik J | Human presence detection techniques |
CN103238156A (en) * | 2011-04-15 | 2013-08-07 | 株式会社Ntt都科摩 | Portable terminal, and grip characteristic learning method |
CN103269400A (en) * | 2013-05-14 | 2013-08-28 | 深迪半导体(上海)有限公司 | Method for turning over system screen of mobile communication equipment |
Cited By (43)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104765453B (en) * | 2015-03-29 | 2017-06-27 | 中国海洋大学 | A kind of identity identifying method of the handheld device based on embedded three-dimensional accelerometer |
CN104765453A (en) * | 2015-03-29 | 2015-07-08 | 中国海洋大学 | Built-in three-dimensional accelerometer based identity authentication method of handheld device |
CN106022034A (en) * | 2015-03-30 | 2016-10-12 | 辛纳普蒂克斯公司 | Systems and methods for biometric authentication |
CN106022034B (en) * | 2015-03-30 | 2021-05-04 | 辛纳普蒂克斯公司 | System and method for biometric authentication |
CN104765995A (en) * | 2015-04-24 | 2015-07-08 | 福建师范大学 | Intelligent device identity authentication method and client side based on touch screen operation |
CN104850773B (en) * | 2015-05-14 | 2018-08-10 | 西安交通大学 | Method for authenticating user identity for intelligent mobile terminal |
CN104850773A (en) * | 2015-05-14 | 2015-08-19 | 西安交通大学 | User identity authentication method for intelligent mobile terminal |
CN105068743A (en) * | 2015-06-12 | 2015-11-18 | 西安交通大学 | Mobile terminal user identity authentication method based on multi-finger touch behavior characteristics |
CN105068743B (en) * | 2015-06-12 | 2018-07-17 | 西安交通大学 | Based on the mobile terminal user identity authentication method for more referring to touch-control behavioural characteristic |
CN104966016B (en) * | 2015-06-12 | 2018-09-04 | 西安交通大学 | Mobile terminal child user cooperatively judges and the method for limitation operating right |
CN104992089A (en) * | 2015-07-23 | 2015-10-21 | 广东欧珀移动通信有限公司 | Security verification method and system based on touch screen technology |
CN108370509A (en) * | 2015-12-03 | 2018-08-03 | 开利公司 | Utilize the Verification System of kinematic parameter |
CN107194213B (en) * | 2016-03-14 | 2020-03-27 | 阿里巴巴集团控股有限公司 | Identity recognition method and device |
CN107194213A (en) * | 2016-03-14 | 2017-09-22 | 阿里巴巴集团控股有限公司 | A kind of personal identification method and device |
CN105912910A (en) * | 2016-04-21 | 2016-08-31 | 武汉理工大学 | Cellphone sensing based online signature identity authentication method and system |
CN106204039A (en) * | 2016-06-30 | 2016-12-07 | 宇龙计算机通信科技(深圳)有限公司 | A kind of safe payment method and system |
CN106331363A (en) * | 2016-09-09 | 2017-01-11 | 常州大学 | Blind identification and guiding-type blind guiding method based on intelligent mobile phone |
CN106331363B (en) * | 2016-09-09 | 2019-03-22 | 常州大学 | A method of blind person's identification and guiding guide based on smart phone |
CN107273728A (en) * | 2017-05-05 | 2017-10-20 | 西安交通大学苏州研究院 | Intelligent watch unblock and authentication method based on motion-sensing behavioural characteristic |
CN107273728B (en) * | 2017-05-05 | 2020-11-03 | 西安交通大学苏州研究院 | Smart watch unlocking and authentication method based on motion sensing behavior characteristics |
CN107194216A (en) * | 2017-05-05 | 2017-09-22 | 中南大学 | A kind of mobile identity identifying method and system of the custom that swiped based on user |
CN107153780A (en) * | 2017-05-05 | 2017-09-12 | 西安交通大学苏州研究院 | The writing behavioural characteristic authentication method of electronic equipment is dressed based on wrist |
CN107026928A (en) * | 2017-05-24 | 2017-08-08 | 武汉大学 | A kind of behavioural characteristic identification authentication method and device based on mobile phone sensor |
CN107194219A (en) * | 2017-06-16 | 2017-09-22 | 西安电子科技大学 | Intelligent terminal identity identifying method based on similarity |
CN107516218A (en) * | 2017-09-30 | 2017-12-26 | 北京梆梆安全科技有限公司 | A kind of user ID authentication method and device based on multiple features |
CN108664785A (en) * | 2018-04-04 | 2018-10-16 | 浙江大学 | A kind of device-fingerprint extraction and authentication method based on CPU module electromagnetic radiation |
CN108664785B (en) * | 2018-04-04 | 2020-12-08 | 浙江大学 | Equipment fingerprint extraction and authentication method based on CPU module electromagnetic radiation |
CN108549806A (en) * | 2018-04-11 | 2018-09-18 | 西安电子科技大学 | The identity identifying method of behavior is slided and clicked based on user |
CN108549806B (en) * | 2018-04-11 | 2020-01-31 | 西安电子科技大学 | Identity authentication method based on user sliding and clicking behaviors |
CN108683503A (en) * | 2018-04-17 | 2018-10-19 | 西京学院 | A kind of dynamic ID identification authentication method based on sound wave |
CN108683503B (en) * | 2018-04-17 | 2021-11-16 | 西京学院 | Dynamic identity recognition and authentication method based on sound waves |
CN108600237A (en) * | 2018-04-28 | 2018-09-28 | 北京京东金融科技控股有限公司 | Identity identifying method, device and medium |
CN109068009A (en) * | 2018-10-26 | 2018-12-21 | 北京交通大学 | The implicit identity identifying method of smart phone based on context detection |
CN109684812B (en) * | 2018-12-29 | 2021-09-03 | 西安电子科技大学 | Continuous identity authentication method for mobile equipment to acquire user motion behaviors |
CN109684812A (en) * | 2018-12-29 | 2019-04-26 | 西安电子科技大学 | A kind of lasting identity identifying method of mobile device acquisition user movement behavior |
CN110324350A (en) * | 2019-07-09 | 2019-10-11 | 中国工商银行股份有限公司 | Identity identifying method and server based on the non-sensitive sensing data in mobile terminal |
CN110324350B (en) * | 2019-07-09 | 2021-12-07 | 中国工商银行股份有限公司 | Identity authentication method and server based on mobile terminal non-sensitive sensor data |
CN110414196A (en) * | 2019-07-29 | 2019-11-05 | 深圳大学 | A kind of smartwatch auth method based on vibration signal |
CN110418337A (en) * | 2019-07-29 | 2019-11-05 | 北京邮电大学 | Identity identifying method and device |
CN110472389A (en) * | 2019-07-31 | 2019-11-19 | 南京大学 | Identity authorization system and its working method based on touch control gesture |
WO2021204086A1 (en) * | 2020-04-06 | 2021-10-14 | 华为技术有限公司 | Identity authentication method, and method and device for training identity authentication model |
CN112699971A (en) * | 2021-03-25 | 2021-04-23 | 荣耀终端有限公司 | Identity authentication method and device |
CN115174220A (en) * | 2022-07-06 | 2022-10-11 | 四川九洲空管科技有限责任公司 | Physical layer security authentication method based on dynamic time warping |
Also Published As
Publication number | Publication date |
---|---|
CN104408341B (en) | 2017-06-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104408341A (en) | Smart phone user identity authentication method based on gyroscope behavior characteristics | |
Buschek et al. | Improving accuracy, applicability and usability of keystroke biometrics on mobile touchscreen devices | |
Stanciu et al. | On the effectiveness of sensor-enhanced keystroke dynamics against statistical attacks | |
CN108229130B (en) | Verification method and device | |
Shahzad et al. | Secure unlocking of mobile touch screen devices by simple gestures: You can see it but you can not do it | |
EP3100152B1 (en) | User-authentication gestures | |
Xu et al. | Towards continuous and passive authentication via touch biometrics: An experimental study on smartphones | |
Serwadda et al. | When kids' toys breach mobile phone security | |
EP3497621B1 (en) | Identifying one or more users based on typing pattern and/or behaviour | |
Li et al. | Unobservable re-authentication for smartphones. | |
Muaaz et al. | An analysis of different approaches to gait recognition using cell phone based accelerometers | |
CN104809377B (en) | Network user identity monitoring method based on webpage input behavior feature | |
Lu et al. | Safeguard: User reauthentication on smartphones via behavioral biometrics | |
Serwadda et al. | Examining a large keystroke biometrics dataset for statistical-attack openings | |
US10965671B2 (en) | Authenticating a user | |
CN103677644A (en) | Unlocking method and system for smart mobile terminal | |
CN102946481A (en) | Method and system for unlocking human face expression | |
CN107153780B (en) | Writing behavior feature authentication method based on wrist wearable electronic equipment | |
US9202035B1 (en) | User authentication based on biometric handwriting aspects of a handwritten code | |
Wang et al. | Sensor-based user authentication | |
CN105212942A (en) | Utilize the Verification System of Biont information | |
CN107273728B (en) | Smart watch unlocking and authentication method based on motion sensing behavior characteristics | |
JP6745009B1 (en) | Authentication system, authentication device, authentication method, and program | |
Wang et al. | Towards DTW-based unlock scheme using handwritten graphics on smartphones | |
CN104915585A (en) | Sensor characteristic sub-area modeling-based monitor method for user identity of touch screen equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |