U-Stroke Pattern Modeling for End User Identity Verification Through Ubiquitous Input Device

نویسندگان

  • Tapalina Bhattasali
  • Nabendu Chaki
  • Khalid Saeed
  • Rituparna Chaki
چکیده

Identity verification on ubiquitous input devices is a major concern to validate end-users, because of mobility of the devices. User device interaction (UDI) is capable to capture end-users’ behavioral nature from their device usage pattern. The primary goal of this paper is to collect heterogeneous parameters of usage patterns from any device and build personal profile with goodrecognition capability. This work mainly focuses on finding multiple features captured from the usage of smart devices; so that parameters could be used to compose hybrid profile to verify endusers accurately. In this paper, U-Stroke modeling is proposed to capture behavioral data mainly from smart input devices in ubiquitous environment. In addition to this, concept of CCDA (capture, checking, decision, and action) model is proposed to process U-Stroke data efficiently to verify end-user’s identity. This proposal can draw attention of many researchers working on this domain to extend their research towards this direction.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Gesture recognition through angle space

As the notion of ubiquitous computing becomes a reality, the keyboard and mouse paradigm become less satisfactory as an input modality. The ability to interpret gestures can open another dimension in the user interface technology. In this paper, we present a novel approach for dynamic hand gesture modeling using neural networks. The results show high accuracy in detecting single and multiple ge...

متن کامل

Flexible and Transparent User Authentication for Mobile Devices

The mobile device has become a ubiquitous technology that is capable of supporting an increasingly large array of services, applications and information. Given their increasing importance, it is imperative to ensure that such devices are not misused or abused. Unfortunately, a key enabling control to prevent this, user authentication, has not kept up with the advances in device technology. This...

متن کامل

A Ubiquitous Space User Interface (UUI) of Ubiquitous Fashionable Computer in a Ubiquitous Computing Environment, U-TOPIA

The interactive ubiquitous computing project, U-TOPIA, explores new possibilities for people working together in technology-rich spaces. Ubiquitous fashionable computers have more to do with form factor and usability than with computing. This paper focuses on our effort to overcome the challenges in a limited user interface of a wearable computer by providing a new interface, called Ubiquitous ...

متن کامل

U-learning Scenarios within Context Aware Ubiquitous Learning Environments

The combination of context-aware, pervasive and ubiquitous computing provides for environments that are able to adapt to user‘s identity, preferences, location, time etc. Lifelong and life-wide learning supported by these technologies are highly personalized and adaptive, supplying the user with the suitable learning content, at an appropriate place, and at the right time. In this paper we appr...

متن کامل

Mobility Profiling for User Verification with Anonymized Location Data

Mobile user verification is to authenticate whether a given user is the legitimate user of a smartphone device. Unlike the current methods that commonly require users active cooperation, such as entering a short pin or a one-stroke draw pattern, we propose a new passive verification method that requires minimal imposition of users through modelling users subtle mobility patterns. Specifically, ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015