Continuous mobile authentication using user-phone interaction
This chapter aims to introduce and discuss continuous user authentication during natural user-phone interaction. Two types of user authentication are considered, including touch gesture-based and keystroke-based methods.We have described the threats encountered by the pervasive mobile devices, and that the goal of continuous user authentication is to balance security and usability duringnatural user-phone interaction. Literature on two types of user authentication has been reviewed, including touch gesture-based and keystroke-based authentication methods. General touch gesture features have also been elaborated as the feature basis for both types of methods. Three methods have been described: the first one using dynamic time warping, the second one using GTGF and statistical modelling, and the last one using virtual key typing features. The first two methods are good examples of continuous user authentication, which extract user identity from touch gestures throughout the usage sessions. The last method is a good example of user authentication, which takes effects when users apply virtual key typing. We have evaluated the effectiveness of the methods using collected databases as well as online testing user studies.
Continuous mobile authentication using user-phone interaction, Page 1 of 2
< Previous page Next page > /docserver/preview/fulltext/books/sc/pbse003e/PBSE003E_ch8-1.gif /docserver/preview/fulltext/books/sc/pbse003e/PBSE003E_ch8-2.gif