Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

User identity recognition method based on carrying position and carrying mode of smart mobile phone

A technology of user identification and carrying location, which is applied in character and pattern recognition, computer security devices, devices with sensors, etc. problem, to achieve a safe and reliable authentication method, to ensure authenticity, and to achieve the effect of a wide range of applications

Inactive Publication Date: 2018-11-02
NANJING UNIV OF AERONAUTICS & ASTRONAUTICS
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] On the premise of the ultimate goal of non-contact identification, first of all, most of the existing technologies are produced to solve a certain application, and do not have wide applicability, that is, they do not consider the different levels, different users, and different applications of mobile phones. and other factors; secondly, most of the existing work is research on fixed positions and fixed directions, but in real life, everyone has different habits of carrying mobile phones, and identification based on fixed carrying methods has no practical significance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User identity recognition method based on carrying position and carrying mode of smart mobile phone
  • User identity recognition method based on carrying position and carrying mode of smart mobile phone
  • User identity recognition method based on carrying position and carrying mode of smart mobile phone

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0126] Embodiment 1 provides a method for collecting data from mobile phone sensors of users in different locations, including the following steps:

[0127] First, the user sets the program to the sample collection mode, selects a location where the sample will be collected from the location options, and at the same time places the mobile phone in the corresponding location. ) above the distance can be. In the process of walking, try to ensure that there is no relative movement between the mobile phone and the body, change the wearing method of the mobile phone, and follow the above steps to re-collect sample data of other wearing methods. Users can define custom wearing methods according to personal needs. and identification.

Embodiment 2

[0129] Embodiment 2 provides an example of mobile phone location information identification, which mainly includes the following steps:

[0130] Taking the user's mobile phone as an example, the collected sensor data is filtered and segmented, and then the SFFS algorithm is used to extract the feature set suitable for location information recognition, and these feature sets are corresponding to the position of the user's hand, and then the DT algorithm is used Train a model for location recognition. Similarly, change the location of the mobile phone (for example: the left pocket of the jacket, the right pocket of the jacket, the waist, the left trouser pocket, the right trouser pocket, etc.), and re-train the model in other positions according to the above steps.

Embodiment 3

[0132] Embodiment 3 provides an example of mobile phone user identification, which mainly includes the following steps:

[0133] In Embodiment 2, we can identify the user's mobile phone wearing method with a high accuracy rate. However, there is still a certain probability of error. In order to solve this problem, in the model training of identity authentication, we can use the data marked with location tags by ourselves for model training of location recognition. At the same time, in a real environment, everyone wears a mobile phone in a very different way, and in the actual operation of our system, the user can also decide which positions to use for identity authentication: For example, user A often The trouser pocket and mobile phone are used to carry the mobile phone, so in the process of location recognition and identity authentication, only the data of the corresponding location is needed to be trained, which is a good solution to the personalized wearing style of each use...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a user identity recognition method based on a carrying position and a carrying mode of a smart mobile phone, and belongs to the technical field of mobile terminal control recognition. The method comprises the following steps: firstly, acquiring sensor data of the mobile phone at different positions; filtering the sensor data by a SavitzkyGolay filter; partitioning an acceleration time sequence into data segments by using a gait cycle detection algorithm; extracting time domain features and frequency domain features from the partitioned data by adopting a statistics method; extracting a feature set of position recognition by using a SFFS (Sequential Floating Forward Selection) method; confirming the specific position of the mobile phone worn by a user according to the selected features in conjunction with a DT algorithm; and finally, converting codes of the recognized mobile phone wearing position through a One Hot Coding algorithm, and performing user identity recognition according to extracted statistic features in conjunction with trained user information by a SVM (Support Vector Machine) algorithm. Through adoption of the user identity recognition methodprovided by the invention, a continuous, safe and reliable identity recognition method is provided for mobile phone users and application manufacturers.

Description

technical field [0001] The invention relates to a mobile phone user identification method, in particular to a user identification method based on a smart phone's carrying position and carrying mode, and belongs to the technical field of mobile terminal control and identification. technical background [0002] With the rapid growth of smartphones in terms of computing power, perception, etc., bringing convenience to humans is also accompanied by privacy risks. Therefore, a secure and continuous user authentication mechanism is essential. [0003] However, due to the traditional digital password mechanism, many users set it too simply or are easily forgotten, which will lead to unsafe factors such as leakage of personal privacy information. Therefore, identification based on smartphones has emerged as the times require. Existing identity recognition is mostly based on physiological recognition including fingerprint recognition and face recognition, which belongs to the categor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04M1/67H04M1/725G06F21/31G06K9/62
CPCH04M1/67G06F21/316H04M2250/12H04M1/72457H04M1/72463H04M1/72454G06F18/2411
Inventor 赵蕴龙耿倩孙龙寿
Owner NANJING UNIV OF AERONAUTICS & ASTRONAUTICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products