USER AUTHENTICATION BASED ON BEHAVIORAL PATTERNS

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

N-Gram-Based User Behavioral Model for Continuous User Authentication

We posit that each of us is unique in our use of computer systems. It is this uniqueness that we leverage in this paper to “continuously authenticate users” while they use web software. We build an n-gram model of each user’s interactions with software. This probabilistic model essentially captures the sequences and sub-sequences of user actions, their orderings, and temporal relationships that...

متن کامل

Behavioral Biometrics for Smartphone User Authentication

Pervasive in nature and extensively used for a wide range of features, smartphone provides functionality such as social networking, online shopping, mobile gaming, private/group communication, etc. While using these services, a user has to provide private information such as account credentials, credit card details, etc., which are then stored on the device. This information, if lost, can resul...

متن کامل

Authentication Based on Context and Behavioral Biometrics

Safelayer Secure Communications S.A. is a solution manufacturer of multi-factor authentication, PKI authentication and electronic signature C/ Basauri, 17 Edif. Valrealty Edif. B Pl. Baja Izq. 28023 Madrid World Trade Center (Edif. S-4), Moll de Barcelona S/N 08039 Barcelona +34 917080480 – Safelayer.com © C op yr ig ht 1 99 920 13 S af el ay er S ec ur e C om m un ic at io ns , S .A . A ll br ...

متن کامل

Sensor-Based User Authentication

We study the feasibility of leveraging the sensors embedded on mobile devices to enable a user authentication mechanism that is easy for users to perform, but hard for attackers to bypass. The proposed approach lies on the fact that users perform gestures in a unique way that depends on how they hold the phone, and on their hand’s geometry, size, and flexibility. Based on this observation, we i...

متن کامل

User authentication based on foot motion

In nearly all current systems user authentication mechanism is one time and static. Although such type of user authentication is sufficient for many types of applications, in some scenarios continuous or periodic re-verification of the identity is desirable, especially in high security application. In this paper we study user authentication based on 3D foot motion which can be suitable for peri...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computing

سال: 2014

ISSN: 2312-5381,1727-6209

DOI: 10.47839/ijc.6.1.427