计算机工程与应用2018,Vol.54Issue(6):19-25,7.DOI:10.3778/j.issn.1002-8331.1712-0323
面向移动终端的隐式身份认证机制综述
Review of implicit authentication for mobile devices
摘要
Abstract
The implicit authentication for mobile devices transparently and continuously authenticates users by monitoring information such as mobile devices environment and user behavior,which can enhance the availability and security of existing authentication mechanisms.This paper introduces the research of implicit authentication schemes. Firstly, the local and network-based architecture is introduced.Secondly,five types of data collection methods are summarized.Thirdly, user identification classification algorithms are introduced,which based on machine learning and so on.The correctness of each algorithm is analyzed and compared. Finally, two types of access control mechanisms are summarized, and the mimicry attacks and privacy leaks of implicit authentication are discussed.关键词
隐式身份认证/移动终端/用户行为/访问控制/信息安全Key words
implicit authentication/mobile device/user behavior/access control/information security分类
信息技术与安全科学引用本文复制引用
徐国愚,苗许娜,张俊峰,姜涛,马小飞..面向移动终端的隐式身份认证机制综述[J].计算机工程与应用,2018,54(6):19-25,7.基金项目
国家自然科学基金(No.61602153,No.31700858,No.61702161,No.61309033) (No.61602153,No.31700858,No.61702161,No.61309033)
河南省科技攻关项目(No.182102210020) (No.182102210020)
河南省高等学校重点科研项目(No.18B520003). (No.18B520003)