Draw It As Shown: Behavioral Pattern Lock for Mobile User Authentication

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Behavioral Biometrics for Smartphone User Authentication

Pervasive in nature and extensively used for a wide range of features, smartphone provides functionality such as social networking, online shopping, mobile gaming, private/group communication, etc. While using these services, a user has to provide private information such as account credentials, credit card details, etc., which are then stored on the device. This information, if lost, can resul...

متن کامل

Mining Keystroke Timing Pattern for User Authentication

In this paper we investigate the problem of user authentication based on keystroke timing pattern. We propose a simple, robust and non parameterized nearest neighbor based regression algorithm for anomaly detection. Our approach successfully handle drawbacks like outlier detection and scale variation. Apart from using existing keystroke timing features from the dataset like dwell time and fligh...

متن کامل

N-Gram-Based User Behavioral Model for Continuous User Authentication

We posit that each of us is unique in our use of computer systems. It is this uniqueness that we leverage in this paper to “continuously authenticate users” while they use web software. We build an n-gram model of each user’s interactions with software. This probabilistic model essentially captures the sequences and sub-sequences of user actions, their orderings, and temporal relationships that...

متن کامل

Active User Authentication for Mobile Devices

Most mobile devices use passwords, pin numbers, or secret patterns for authenticating users. However, as long as the device remains active after an initial authentication, there is usually no mechanism by which to verify that the originally-authenticated user is still the one in control of the device. As a result, unauthorized individuals may be able to use a compromised device to improperly ga...

متن کامل

Implicit User Re-authentication for Mobile Devices

Portable computers are used to store and access sensitive information. They are frequently used in insecure locations with little or no physical protection, and are therefore susceptible to theft and unauthorized access. We propose an implicit user re-authentication system for portable computers that requires no application changes or hardware modifications. The proposed technique observes user...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2019

ISSN: 2169-3536

DOI: 10.1109/access.2019.2918647