User authentication on smart phones using a data mining method

Yujin Tang*, Nakazato Hidenori, Yoshiyori Urano

*この研究の対応する著者

研究成果: Conference contribution

8 被引用数 (Scopus)

抄録

The 21st century witnessed the wide spread of smart phones such as iPhone. The daily growing importance of smart phones' also implies the increasing amount of user sensitive data stored in a cell phone, which positions mobile user authentication in an even more important role. Existing mobile user authentication methods either require special hardware or are not user transparent. In this paper, we present a mobile user authentication scheme using a data mining method that identifies a user based on cell phones' application history and GPS information. These data can be collected on almost every smart phone without user awareness and are prone to reflect a user's habit and biometric feature. We organize these data in directional graphs and introduce a metric based on which to classify the data. Experiments and results on real data are explained to show our scheme's effectiveness.

本文言語English
ホスト出版物のタイトル2010 International Conference on Information Society, i-Society 2010
ページ173-178
ページ数6
出版ステータスPublished - 2010 12 1
イベント2010 International Conference on Information Society, i-Society 2010 - London, United Kingdom
継続期間: 2010 6 282010 6 30

出版物シリーズ

名前2010 International Conference on Information Society, i-Society 2010

Conference

Conference2010 International Conference on Information Society, i-Society 2010
国/地域United Kingdom
CityLondon
Period10/6/2810/6/30

ASJC Scopus subject areas

  • 情報システム

フィンガープリント

「User authentication on smart phones using a data mining method」の研究トピックを掘り下げます。これらがまとまってユニークなフィンガープリントを構成します。

引用スタイル