Security Protection System Based on Behavior Fingerprint

A security protection and behavior technology, applied in computer security devices, instruments, digital data authentication, etc., can solve the problems that single-dimensional data cannot effectively describe user behavior characteristics, poor terminal adaptability, and poor model reliability, etc. Reduce custodial costs and risk of key loss, ensure security and normal operation, and reduce the effect of precision

Active Publication Date: 2019-04-05
上海智芝全智能科技有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The present invention aims at defects such as only gyroscope sensors are used in the prior art, and single-dimensional data cannot effectively describe the behavior characteristics of users, and it has low accuracy, poor model reliability, and poor adaptability to different terminals, etc., and proposes a The security protection system based on behavioral fingerprints can detect and actively block intruders' attacks in real time, ensuring the security and normal operation of mobile terminals, reducing security costs, reducing the user's key storage costs and the risk of key loss , and run simultaneously with the original protection system as an added security measure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security Protection System Based on Behavior Fingerprint

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0015] Such as figure 1 As shown, the present embodiment includes: a collection module, a training module and a comparison module, wherein: the collection module collects the user's behavioral fingerprint information and transmits it to the training module, and the training module uses SVM modeling to obtain the judgment threshold of the behavioral fingerprint information, and the comparison module Receive new fingerprint information from the collection module and compare it with the judgment threshold to identify the user.

[0016] The behavioral fingerprint information includes: abscissa x of the touch point, y coordinate of the touch point y, pressing duration t, pressing area s, angular acceleration, and acceleration g. The angular acceleration includes: X-axis angular acceleration α, Y-axis angular acceleration β and Z-axis angular acceleration γ.

[0017] The acquisition module is connected with a touch screen for obtaining the abscissa x of the touch point, the y coord...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security protection system based on a behavior fingerprint. The system comprises a collection module, a training module and a comparison module. The collection module is used for collecting behavior fingerprint information of a user and transmits the behavior fingerprint information to the training module. The training module models to obtain a judging threshold value of the behavior fingerprint information by employing a SVM. The comparison module receives new fingerprint information from the collection module and compares the fingerprint information with the judging threshold value, thereby identifying a user identity. According to the system, an attack behavior of an invader can be discovered in real time and can be blocked actively, the security and normal operation of a mobile terminal can be ensured, the security cost is reduced, the reservation cost of the user for a key is reduced, the risk of losing the key is reduced, and the system is operated along with the original protection system, thereby increasing a security protection measure. When the system is employed by the user, a whole process can be protected, the user does not need to remember any key, a hidden protection effect is realized, the system is taken as a second defense line for the security of the mobile terminal of the user, and the system has wide applicability.

Description

technical field [0001] The present invention relates to a technology in the field of equipment security, in particular to a security protection system based on behavioral fingerprints. Background technique [0002] A mobile terminal is a computer device used on the move, including mobile phones and other portable devices. With the development of technology, the mobile terminal has changed from a simple caller to a comprehensive information processing platform. The security of mobile terminals is becoming more and more important, and the passive defense measures usually adopted, such as passwords, lock screen patterns, etc., cannot effectively prevent intruders. Behavioral fingerprints refer to the characteristics of users that are different from others due to personal habits and biological differences in the operation of electronic equipment. Contents of the invention [0003] The present invention aims at defects such as only gyroscope sensors are used in the prior art,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/32G06F21/31
CPCG06F21/316G06F21/32G06F2221/2105
Inventor 易平黄程顾双驰王科迪
Owner 上海智芝全智能科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products