Font Size: a A A

User Behaviour Based Secure Authentication Of Intelligent Terminals

Posted on:2015-05-16Degree:MasterType:Thesis
Country:ChinaCandidate:N LiFull Text:PDF
GTID:2308330464968940Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the progress of mobile communications industry in China, the mobile intelligent terminal industry received a rapid development, and the intelligence of terminal products are also rising. Intelligent terminal can easily solve most of the problems in our daily life. We enjoy the convenience brought by intelligent terminals. But it also produces information security issues which cannot be ignored. In order to ensure users’ privacy and the data security of intelligent terminals, intelligent terminals commonly used authentication to ensure information security. Currently the main intelligent terminal authentication methods are static password authentication, double-factor authentication, dynamic password authentication, biometric authentication and USB Key certification and so on. The double-factor authentication greatly enhances the security of single-factor authentication and has the advantages of convenience and efficiency. It has a good performance in the compromise of safety and convenience.The touch authentication methods have the flaw that the authentication information may be left on the terminal screen. A malicious can easily steal the authentication information. So the intelligent terminal has a larger security risk. There is a problem that the user privacy data can be easily leaked on the intelligent terminal screen and the touch certification has a lower security. So the paper designs an intelligent terminal security authentication method based on user behavior characteristic. In consideration of the low security of single-factor authentication and also the single password authentication alone cannot accurately identify the true user, this paper finally adopted double-factor authentication in order to ensure the safety and convenience of certification. The user behavior characteristics can be divided into many kinds. This paper selects the time sequence that user input password by touching screen. The time sequence is consists of each two adjacent characters when user input the password. The password and the user behavior characteristics will be tested at the same time. If the two factors are matched, the authentication is successful, otherwise the authentication failure.Firstly, the paper designs and makes a series of experiments. In the experiments, the user behavior characteristics of members in the class are recorded. It is used to analyze whether the double-factor authentication via password and user behavior characteristics can be an effective method. After collecting the data, we use the radar charts in Microsoft Excel to distinguish user behavior characteristics and then display it by using tabular. The experimental results show that most of the users’ identity can be recognized by the double-factor of password and user behavior characteristics. However, there are still some errors and exceptions.To solve this problem, the paper improved the method by the addition of a password and human characteristics to identify the users’ identity. Students in the class is grouped according to whether they know the password and the input feature. Students in each group try to attack the password with a string, and then authentication success rate of each group is recorded. The authentication success rate by different users attacking the password is simulated by a line chart. The experimental results show that the proposed intelligent terminal authentication method combining password authentication with human characteristics can ensure the safety of intelligent terminal authentication in case of the leakage of password.
Keywords/Search Tags:Authentication, Behavior characteristics, Security, Intelligent terminal
PDF Full Text Request
Related items