USER AUTHENTICATION BASED ON BEHAVIORAL PATTERNS
نویسندگان
چکیده
منابع مشابه
N-Gram-Based User Behavioral Model for Continuous User Authentication
We posit that each of us is unique in our use of computer systems. It is this uniqueness that we leverage in this paper to “continuously authenticate users” while they use web software. We build an n-gram model of each user’s interactions with software. This probabilistic model essentially captures the sequences and sub-sequences of user actions, their orderings, and temporal relationships that...
متن کاملBehavioral Biometrics for Smartphone User Authentication
Pervasive in nature and extensively used for a wide range of features, smartphone provides functionality such as social networking, online shopping, mobile gaming, private/group communication, etc. While using these services, a user has to provide private information such as account credentials, credit card details, etc., which are then stored on the device. This information, if lost, can resul...
متن کاملAuthentication Based on Context and Behavioral Biometrics
Safelayer Secure Communications S.A. is a solution manufacturer of multi-factor authentication, PKI authentication and electronic signature C/ Basauri, 17 Edif. Valrealty Edif. B Pl. Baja Izq. 28023 Madrid World Trade Center (Edif. S-4), Moll de Barcelona S/N 08039 Barcelona +34 917080480 – Safelayer.com © C op yr ig ht 1 99 920 13 S af el ay er S ec ur e C om m un ic at io ns , S .A . A ll br ...
متن کاملSensor-Based User Authentication
We study the feasibility of leveraging the sensors embedded on mobile devices to enable a user authentication mechanism that is easy for users to perform, but hard for attackers to bypass. The proposed approach lies on the fact that users perform gestures in a unique way that depends on how they hold the phone, and on their hand’s geometry, size, and flexibility. Based on this observation, we i...
متن کاملUser authentication based on foot motion
In nearly all current systems user authentication mechanism is one time and static. Although such type of user authentication is sufficient for many types of applications, in some scenarios continuous or periodic re-verification of the identity is desirable, especially in high security application. In this paper we study user authentication based on 3D foot motion which can be suitable for peri...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computing
سال: 2014
ISSN: 2312-5381,1727-6209
DOI: 10.47839/ijc.6.1.427