Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Sensor characteristic sub-area modeling-based monitor method for user identity of touch screen equipment

A device user and sensor technology, applied in instruments, digital data authentication, electrical digital data processing, etc., can solve the problems of forgetting passwords, finger movement guessing attacks, easy to be stolen, etc., to improve robustness and fault tolerance, The effect of increasing practicality and ensuring stability

Active Publication Date: 2015-09-16
XI AN JIAOTONG UNIV
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For the text password method, it is easy to implement and simple and convenient, but it is easy to forget the password or be stolen
For graphic passwords (users need to connect several points in a certain order on a 3×3 dot matrix as a password), it is easy to remember, but touch screen traces and finger movements are easy to be used or observed to cause guessing attacks
For the fingerprint identification method, although the accuracy is high, it requires special hardware support
In addition, the above-mentioned identity verification methods can only be used for one-time protection in certain specific occasions (such as when unlocking), and once the mobile phone is hacked, it will completely lose its resistance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sensor characteristic sub-area modeling-based monitor method for user identity of touch screen equipment
  • Sensor characteristic sub-area modeling-based monitor method for user identity of touch screen equipment
  • Sensor characteristic sub-area modeling-based monitor method for user identity of touch screen equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] see figure 1 , the present invention proposes a touch-screen device user identity monitoring method based on sensor feature sub-area modeling, which can be used to judge the identity legitimacy of the touch-screen device user in real time, and then protect the sensitive information stored inside the touch-screen device. Concrete implementation steps of the present invention are as follows:

[0036] (1) When a touch screen device is used, the identity monitoring system judges whether the touch screen device is a new device; if it is a new device, enter step (2) to build an identity monitoring model; if the touch screen device is a used device, enter Step (3) Turn on the identity monitoring mode; for example, select a touch-screen smart phone as an experimental machine, and the software implemented by this method is embedded in the mobile phone system. When the mobile phone is turned on and the screen is lit, first read the system activation information. If If the mobile...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a sensor characteristic sub-area modeling-based monitor method for user identity of touch screen equipment. The method of the invention could use sensor data generated by a user to perform click operation on the touch screen equipment to perform silent monitor to legality of the user identity. The method comprises the steps as follows: 1) judging whether the touch screen equipment is new touch screen equipment or old touch screen equipment, entering into a step 2) to establish an identity monitor model if the touch screen equipment is the new equipment; entering into a step 3) of the identity monitor model if the touch screen equipment is the old equipment, wherein the step of establishing the identity monitor model is to divide a screen area as P plus Q touch screen area blocks, extracting data characteristics of a motion sensor in each touch screen area block, and establishing an identity monitor sub-model under each touch screen area block. The identity monitor mode is to capture motion sensor data generated via a click operation based on an observing window in a process that a user touches a screen, and extracts characteristic thereof as the input of the identity monitor sub-model under the touch screen area block so as to achieve real time monitoring of the user identity via threshold comparison.

Description

technical field [0001] The invention relates to a touch screen device safety protection technology, in particular to an identity monitoring method for a touch screen device user during interaction with the touch screen device. Background technique [0002] With the rapid development of the mobile Internet, smart phones have penetrated into all walks of life, affecting every detail of people's life and work. Smartphones record and store more and more important data (such as account passwords) and private information (such as SMS calls, pictures and videos) of mobile users. Especially in recent years, the widespread use of mobile payment-related applications and the frequent occurrence of privacy leaks have made the security protection of smartphones gradually come into the view of the government and the public. [0003] Secure and efficient authentication is at the heart of the secure use of smartphones. At present, there are mainly three authentication methods for smart ph...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31
CPCG06F21/316
Inventor 沈超裴仕超管晓宏余天文
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products