A Behavioral Authentication Method for Mobile Based on Browsing Behaviors

被引:0
|
作者
Dongxiang Chen [1 ,2 ]
Zhijun Ding [3 ,1 ,2 ]
Chungang Yan [1 ,2 ]
Mimi Wang [3 ,1 ,2 ]
机构
[1] the Department of Computer Science and Technology,Tongji University
[2] the Key Laboratory of Embedded System and Service Computing, Ministry of Education, Tongji University
[3] IEEE
关键词
D O I
暂无
中图分类号
TN929.53 [蜂窝式移动通信系统(大哥大、移动电话手机)]; TP309 [安全保密];
学科分类号
080402 ; 080904 ; 0810 ; 081001 ; 081201 ; 0839 ; 1402 ;
摘要
The passwords for unlocking the mobile devices are relatively simple, easier to be stolen, which causes serious potential security problems. An important research direction of identity authentication is to establish user behavior models to authenticate users. In this paper, a mobile terminal APP browsing behavioral authentication system architecture which synthesizes multiple factors is designed. This architecture is suitable for users using the mobile terminal APP in the daily life. The architecture includes data acquisition, data processing, feature extraction, and sub model training. We can use this architecture for continuous authentication when the user uses APP at the mobile terminal.
引用
收藏
页码:1528 / 1541
页数:14
相关论文
共 50 条
  • [1] A Behavioral Authentication Method for Mobile Based on Browsing Behaviors
    Chen, Dongxiang
    Ding, Zhijun
    Yan, Chungang
    Wang, Mimi
    IEEE-CAA JOURNAL OF AUTOMATICA SINICA, 2020, 7 (06) : 1528 - 1541
  • [2] A Kind of Identity Authentication Method Based on Browsing Behaviors
    Zhong, Junzhu
    Yan, Chungang
    Yu, Wangyang
    Zhao, Peihai
    Wang, Mimi
    2014 SEVENTH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID 2014), VOL 2, 2014,
  • [3] TouchWB: Touch behavioral user authentication based on web browsing on smartphones
    Meng, Weizhi
    Wang, Yu
    Wong, Duncan S.
    Wen, Sheng
    Xiang, Yang
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 117 : 1 - 9
  • [4] Mobrex: Visualizing users' mobile browsing behaviors
    Burigat, Stefano
    Chittaro, Luca
    Ieronutti, Lucio
    IEEE COMPUTER GRAPHICS AND APPLICATIONS, 2008, 28 (01) : 24 - 32
  • [5] Mobile terminal identity authentication system based on behavioral characteristics
    Liang, Xiaoshi
    Zou, Futai
    Li, Linsen
    Yi, Ping
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2020, 16 (01)
  • [6] A Behavioral Authentication Method for Mobile Gesture Against Resilient User Posture
    Liu, Qiang
    Wang, Mimi
    Zhao, Peihai
    Yan, Chungang
    Ding, Zhijun
    2016 3RD INTERNATIONAL CONFERENCE ON SYSTEMS AND INFORMATICS (ICSAI), 2016, : 324 - 331
  • [7] DIFFERENTIAL PRIVACY FOR RECOMMENDATION MODEL BASED ON WEB BROWSING BEHAVIORS OF MOBILE USERS
    Ding, Zhe
    Qin, Zhen
    Qin, Zhi-Guang
    2016 13TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2016, : 195 - 199
  • [8] Mobile behavioral biometrics for passive authentication
    Stragapede, Giuseppe
    Vera-Rodriguez, Ruben
    Tolosana, Ruben
    Morales, Aythami
    Acien, Alejandro
    Le Lan, Gael
    PATTERN RECOGNITION LETTERS, 2022, 157 : 35 - 41
  • [9] Mobile Terminal Identity Authentication Method Based on IBC
    Chen, Xuqiu
    Wang, Wei
    Gan, Wei
    Yang, Yi
    Yuan, Su
    Li, Meng
    SMART COMPUTING AND COMMUNICATION, 2022, 13202 : 112 - 122
  • [10] Behavioral Biometrics for Mobile User Authentication: Benefits and Limitations
    Papaioannou, Maria
    Mantas, Georgios
    Panaousis, Emmanouil
    Essop, Aliyah
    Rodriguez, Jonathan
    Sucasas, Victor
    2023 IFIP NETWORKING CONFERENCE, IFIP NETWORKING, 2023,