U-Stroke Pattern Modeling for End User Identity Verification Through Ubiquitous Input Device
نویسندگان
چکیده
Identity verification on ubiquitous input devices is a major concern to validate end-users, because of mobility of the devices. User device interaction (UDI) is capable to capture end-users’ behavioral nature from their device usage pattern. The primary goal of this paper is to collect heterogeneous parameters of usage patterns from any device and build personal profile with goodrecognition capability. This work mainly focuses on finding multiple features captured from the usage of smart devices; so that parameters could be used to compose hybrid profile to verify endusers accurately. In this paper, U-Stroke modeling is proposed to capture behavioral data mainly from smart input devices in ubiquitous environment. In addition to this, concept of CCDA (capture, checking, decision, and action) model is proposed to process U-Stroke data efficiently to verify end-user’s identity. This proposal can draw attention of many researchers working on this domain to extend their research towards this direction.
منابع مشابه
Gesture recognition through angle space
As the notion of ubiquitous computing becomes a reality, the keyboard and mouse paradigm become less satisfactory as an input modality. The ability to interpret gestures can open another dimension in the user interface technology. In this paper, we present a novel approach for dynamic hand gesture modeling using neural networks. The results show high accuracy in detecting single and multiple ge...
متن کاملFlexible and Transparent User Authentication for Mobile Devices
The mobile device has become a ubiquitous technology that is capable of supporting an increasingly large array of services, applications and information. Given their increasing importance, it is imperative to ensure that such devices are not misused or abused. Unfortunately, a key enabling control to prevent this, user authentication, has not kept up with the advances in device technology. This...
متن کاملA Ubiquitous Space User Interface (UUI) of Ubiquitous Fashionable Computer in a Ubiquitous Computing Environment, U-TOPIA
The interactive ubiquitous computing project, U-TOPIA, explores new possibilities for people working together in technology-rich spaces. Ubiquitous fashionable computers have more to do with form factor and usability than with computing. This paper focuses on our effort to overcome the challenges in a limited user interface of a wearable computer by providing a new interface, called Ubiquitous ...
متن کاملU-learning Scenarios within Context Aware Ubiquitous Learning Environments
The combination of context-aware, pervasive and ubiquitous computing provides for environments that are able to adapt to user‘s identity, preferences, location, time etc. Lifelong and life-wide learning supported by these technologies are highly personalized and adaptive, supplying the user with the suitable learning content, at an appropriate place, and at the right time. In this paper we appr...
متن کاملMobility Profiling for User Verification with Anonymized Location Data
Mobile user verification is to authenticate whether a given user is the legitimate user of a smartphone device. Unlike the current methods that commonly require users active cooperation, such as entering a short pin or a one-stroke draw pattern, we propose a new passive verification method that requires minimal imposition of users through modelling users subtle mobility patterns. Specifically, ...
متن کامل