본문 바로가기
  • Home

A Secure Authentication Method for Smart Phone based on User’s Behaviour and Habits

  • Journal of The Korea Society of Computer and Information
  • Abbr : JKSCI
  • 2017, 22(9), pp.65-71
  • DOI : 10.9708/jksci.2017.22.09.065
  • Publisher : The Korean Society Of Computer And Information
  • Research Area : Engineering > Computer Science
  • Received : August 16, 2017
  • Accepted : September 18, 2017
  • Published : September 29, 2017

Geum-Boon Lee 1

1조선이공대학교

Accredited

ABSTRACT

This paper proposes a smart phone authentication method based on user's behavior and habit that is an authentication method against shoulder surfing attack and brute force attack. As smart phones evolve not only storage of personal data but also a key means of financial services, the importance of personal information security in smart phones is growing. When user authentication of smart phone, pattern authentication method is simple to use and memorize, but it is prone to leak and vulnerable to attack. Using the features of the smart phone pattern method of the user, the pressure applied when touching the touch pad with the finger, the size of the area touching the finger, and the time of completing the pattern are used as feature vectors and applied to user authentication security. First, a smart phone user models and stores three parameter values as prototypes for each section of the pattern. Then, when a new authentication request is made, the feature vector of the input pattern is obtained and compared with the stored model to decide whether to approve the access to the smart phone. The experimental results confirm that the proposed technique shows a robust authentication security using subjective data of smart phone user based on habits and behaviors.

Citation status

* References for papers published after 2023 are currently being built.