User Profiling with Virtual Pet for Mobile Device Authentication

被引:0
|
作者
Lim, Shu Yun
Kho, Jason N. M.
机构
关键词
mobile device; user profiling; virtual pet; human-machine authentication;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Since mobile devices have become an inseparable part of peoples' lives, gathering user profiles from mobile devices can provide a better grasp of the device ownership. Mobile user profiling is done by focusing on information that can be used to authenticate the real owner of a device. A novel human-machine authentication mechanism is proposed. This objective is achieved via profiling of the user through his or her interaction with a virtual pet that resides on the mobile device to provide robust, intelligent, continuous and transparent authentication of the user. Virtual pets that reside in devices can turn phones into 'sentient beings' and are able to analyse the users' behaviour through constant interaction with them.
引用
收藏
页码:229 / 237
页数:9
相关论文
共 50 条
  • [1] User Authentication using Profiling in Mobile Cloud Computing
    Jeong, Hoon
    Choi, Euiin
    [J]. AASRI CONFERENCE ON POWER AND ENERGY SYSTEMS, 2012, 2 : 262 - 267
  • [2] User Authentication for Mobile Device through Image Selection
    Nazir, Iffat
    Zubair, Izza
    Islam, M. Hasan
    [J]. NDT: 2009 FIRST INTERNATIONAL CONFERENCE ON NETWORKED DIGITAL TECHNOLOGIES, 2009, : 518 - +
  • [3] Voice Based User-Device Physical Unclonable Functions for Mobile Device Authentication
    Guo, Yunxi
    Tyagi, Akhilesh
    [J]. 2016 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI), 2016, : 512 - 517
  • [4] Secure Key Agreement and Key Protection for Mobile Device User Authentication
    Wu, Libing
    Wang, Jing
    Choo, Kim-Kwang Raymond
    He, Debiao
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (02) : 319 - 330
  • [5] Voice-Based User-Device Physical Unclonable Functions for Mobile Device Authentication
    Yunxi Guo
    Akhilesh Tyagi
    [J]. Journal of Hardware and Systems Security, 2017, 1 (1) : 18 - 37
  • [6] User Authentication for Mobile Devices
    Rogowski, Marcin
    Saeed, Khalid
    Rybnik, Mariusz
    Tabedzki, Marek
    Adamski, Marcin
    [J]. COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT, CISIM 2013, 2013, 8104 : 47 - 58
  • [7] Biometric Authentication on a Mobile Device: A Study of User Effort, Error and Task Disruption
    Trewin, Shari
    Swart, Cal
    Koved, Larry
    Martino, Jacquelyn
    Singh, Kapil
    Ben-David, Shay
    [J]. 28TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2012), 2012, : 159 - 168
  • [8] Analysis of One Secure Key Agreement and Key Protection for Mobile Device User Authentication
    Liu, Lihua
    Hong, Leming
    Cao, Zhengjun
    [J]. International Journal of Network Security, 2022, 24 (02) : 238 - 242
  • [9] Graphical User Authentication Algorithm for Mobile Banking User
    Ugochukwu, Ejike Ekeke Kingsley
    Jusoh, Yusmadi Yah
    Yasin, Sharifah Md
    Abdullah, Azizol
    Abdullah, Salfarina
    [J]. ADVANCED SCIENCE LETTERS, 2018, 24 (07) : 5182 - 5186
  • [10] Active User Authentication for Mobile Devices
    Sui, Yan
    Zou, Xukai
    Li, Feng
    Du, Eliza Y.
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2012, 2012, 7405 : 540 - 548