Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Continuous identity authentication method based on touch screen slip behavior characteristics

An authentication method and touch-screen technology, applied in the direction of digital data authentication, input/output process of data processing, instruments, etc., can solve the problems of observation attack and guess attack, theft, loss of resistance of touch screen equipment, etc. Robustness and fault tolerance, the effect of ensuring stability

Active Publication Date: 2014-12-24
XI AN JIAOTONG UNIV
View PDF9 Cites 56 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the first two methods are vulnerable to observation attacks and guessing attacks, so that the attacker can steal the unlocking method; the fingerprint authentication method requires special hardware support; and these three methods can only ) for one-time protection, once the touch screen device is invaded, it will completely lose its resistance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Continuous identity authentication method based on touch screen slip behavior characteristics
  • Continuous identity authentication method based on touch screen slip behavior characteristics
  • Continuous identity authentication method based on touch screen slip behavior characteristics

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] see figure 1 According to the present invention, the identity authentication method based on the sliding behavior characteristics of the touch screen can be used for real-time monitoring of the legality of the identity of the operator of the touch screen device, and realizes the security protection of the sensitive information stored inside the touch screen device. The present invention includes two parts: user identity model construction and operator identity continuous authentication. The specific implementation steps are as follows:

[0045] 1. The user identity model construction part includes the following steps:

[0046] (1) During the normal use of the touch-screen smart device by the user, collect and record the user's touch-screen sliding operation data to form the touch-screen sliding behavior training data set required for identity model construction; the format of the touch-screen sliding operation data is: {time, touch screen position, finger pressure, fin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a continuous identity authentication method based on touch screen slip behavior characteristics. The method comprises the following steps: analyzing touch screen slip operation behaviors generated when a user operates touch screen equipment; classifying touch screen slip operations into four operation modes according to touch screen slip directions, extracting behavior characteristics under each operation mode, establishing a user identity model under each operation mode based on the behavior characteristics, and performing continuous authentication on the identity of the user of the touch screen equipment by use of a window average method. According to the method, the touch screen slip behaviors do not need to be memorized or carried, behavior data collection can be finished in a daily touch screen equipment use process of the user without cooperation of the user, and non-invasive initiative identity authentication can be realized; in addition, a method of respectively performing modeling and window authentication on different types of touch screen operations is adopted, so that the stability of the authentication model can be ensured, the touch screen behavior characteristics of the user can be better embodied, and the robustness and fault tolerance of continuous identity authentication are obviously improved.

Description

technical field [0001] The invention relates to the safety protection technology of touch screen equipment, in particular to a security identity authentication method for touch screen equipment users. Background technique [0002] With the advancement of social informatization and intelligence, touch-screen devices (such as smart phones and tablet computers) have penetrated into all aspects of people's lives, and more and more personal information (such as text messages, emails, pictures, etc.) and Sensitive information (such as bank account numbers, office data, etc.) is stored in touch-screen devices. In addition, the increasing popularity of business applications on touch-screen devices and the frequent occurrence of privacy information leakage incidents have gradually brought the security protection of touch-screen devices into the public's field of vision. [0003] Existing identity authentication methods for touch screen devices mainly include passwords, Jiugongge pat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/31G06F3/0488
CPCG06F3/04883G06F21/316
Inventor 沈超章勇管晓宏
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products