Draw It As Shown: Behavioral Pattern Lock for Mobile User Authentication
نویسندگان
چکیده
منابع مشابه
Behavioral Biometrics for Smartphone User Authentication
Pervasive in nature and extensively used for a wide range of features, smartphone provides functionality such as social networking, online shopping, mobile gaming, private/group communication, etc. While using these services, a user has to provide private information such as account credentials, credit card details, etc., which are then stored on the device. This information, if lost, can resul...
متن کاملMining Keystroke Timing Pattern for User Authentication
In this paper we investigate the problem of user authentication based on keystroke timing pattern. We propose a simple, robust and non parameterized nearest neighbor based regression algorithm for anomaly detection. Our approach successfully handle drawbacks like outlier detection and scale variation. Apart from using existing keystroke timing features from the dataset like dwell time and fligh...
متن کاملN-Gram-Based User Behavioral Model for Continuous User Authentication
We posit that each of us is unique in our use of computer systems. It is this uniqueness that we leverage in this paper to “continuously authenticate users” while they use web software. We build an n-gram model of each user’s interactions with software. This probabilistic model essentially captures the sequences and sub-sequences of user actions, their orderings, and temporal relationships that...
متن کاملActive User Authentication for Mobile Devices
Most mobile devices use passwords, pin numbers, or secret patterns for authenticating users. However, as long as the device remains active after an initial authentication, there is usually no mechanism by which to verify that the originally-authenticated user is still the one in control of the device. As a result, unauthorized individuals may be able to use a compromised device to improperly ga...
متن کاملImplicit User Re-authentication for Mobile Devices
Portable computers are used to store and access sensitive information. They are frequently used in insecure locations with little or no physical protection, and are therefore susceptible to theft and unauthorized access. We propose an implicit user re-authentication system for portable computers that requires no application changes or hardware modifications. The proposed technique observes user...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2019
ISSN: 2169-3536
DOI: 10.1109/access.2019.2918647