User authentication method based on behavior features

Liu Yunhao,Yang Lei,Guo Yi
2013-01-01
Abstract:The invention provides a user authentication method based on behavior features. The method comprises the steps that (1) a client side percepts and obtains original behavior information when a user rocks the client side, (2) the client side extracts behavior feature data in the original behavior information according to a data mining method, (3) based on the extracted behavior feature data, the client side sets and stores a classified limit of an authenticated user and a non-authenticated user, and (4) when the client side is required to authenticate an identity of a specific user, according to the methods of the first step and the second step, the client side extracts behavior feature data of the specific user, and according to the classified limit obtained by the third step, whether the specific user is the authenticated user is judged. The user authentication method based on the behavior features has the advantages of being high in robustness, simple and rapid, remarkably improves safety of the client side of a smart phone and the like, and increases usage experience of the user.
What problem does this paper attempt to address?