Font Size: a A A

Implicit Authentication Based On Decision Tree In Mobile Device

Posted on:2014-02-17Degree:MasterType:Thesis
Country:ChinaCandidate:J L ZhouFull Text:PDF
GTID:2248330398977454Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
In this digital age today, mobile devices are rapidly growing in popularity. The traditional static password authentication methods are highly susceptible to phishing and keystroke-logging software attack. And mobile device is easy to be lost, stolen, or used by other users, which can’t guarantee the safety of the mobile information. Therefore it is necessary to adopt a more secure authentication measures.On one hand, our paper took advantage of the intelligent terminal frequently used in life; on the other hand we took the user log into consideration. We collected user’s call contacts, SMS contacts, the frequently used websites, the frequently used apps, the websites first visited, the websites which was of most time to browse, to analyze the user’s behavior pattern. We built a decision-tree to compare the user behavior data, and then simplified the authentication progress.Our papers proposed the implicit authentication based on decision tree in mobile device, and offer some good ideas to this field. The proposed architecture was based on decision tree, which was part of authentication decision-making device, and collected the operation objects and tracks of users, thus this architecture can compare the past behavior and come to a conclusion whether the user was legal. At last, we carried on simulation and analyzed the user behavior data, and further proved the practical value of this method.
Keywords/Search Tags:Implicit Authentication, Behavior Habit, Mobile Device, IdentityRecognition
PDF Full Text Request
Related items