Unobtrusive Mobile User Recognition Patent by Seal Mobile ID Presented By: Aparna Bharati & Ashrut Bhatia.

Slides:



Advertisements
Similar presentations
Real time vehicle tracking and driver behavior monitoring using a cellular handset based on accelerometry and GPS data Kevin Burke 4 th Electronic and.
Advertisements

Detecting Computer Intrusions Using Behavioral Biometrics Ahmed Awad E. A, and Issa Traore University of Victoria PST’05 Oct 13,2005.
Virtual Dart: An Augmented Reality Game on Mobile Device Supervisor: Professor Michael R. Lyu Prepared by: Lai Chung Sum Siu Ho Tung.
Network and Systems Laboratory nslab.ee.ntu.edu.tw Kaisen Lin, Aman Kansal, Dimitrios Lymberopoulos, and Feng Zhao Archiang.
Keystroke Biometric Studies Security Research at Pace Keystroke Biometric Drs. Charles Tappert and Allen Stix Seidenberg School of CSIS.
Keystroke Biometric Studies Assignment 2 – Review of the Literature Case Study – Keystroke Biometric Describe problem investigated (intro + abstract) Developed.
Statistical based IDS background introduction. Statistical IDS background Why do we do this project Attack introduction IDS architecture Data description.
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
Multi-criteria infrastructure for location-based applications Shortly known as: Localization Platform Ronen Abraham Ido Cohen Yuval Efrati Tomer Sole'
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
Keystroke Biometric Studies Assignment 2 – Review of the Literature Case Study – Keystroke Biometric Describe the problem being investigated Build a case.
BIOMETRICS: GAIT RECOGNITION
MACHINE VISION GROUP Multimodal sensing-based camera applications Miguel Bordallo 1, Jari Hannuksela 1, Olli Silvén 1 and Markku Vehviläinen 2 1 University.
Biometrics: Ear Recognition
Mobile Sensor Application Group 4. Introduction Modern smartphones are often equipped with quite a large number of sensors. The sensors data can be used.
A Framework for Detection of Anomalous and Suspicious Behavior from Agent’s Spatio-Temporal Traces Boštjan Kaluža Depratment of Intelligent Systems, Jožef.
Karthiknathan Srinivasan Sanchit Aggarwal
Authentication Approaches over Internet Jia Li
Introduction to Biometric Systems
BAR CODE SCANNER A.ANUSHA (06N61A0402). What is bar code? A barcode is a machine readable representation of information. Barcode stores data in widths.
* Hassan Khan,Aaron Atwater,and Urs Hengartner. Outline Background Introduction for IA Previous work on IA challenge Introduction to Itus Itus for app.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
MARS: A Muscle Activity Recognition System Enabling Self-configuring Musculoskeletal Sensor Networks IPSN 2013 NSLab study group 2013/06/17 Presented by:
Presented by: Marcela D. Rodríguez CICESE/UABC, Ensenada, México 1st International Workshop on Ubiquitous Mobile Instrumentation.
Biometric System Design for Handheld Devices Team 4 Naif Alotaibi, Rich Barilla, Francisco Betances, Aditya Chohan, Alexandra Garcia, Alexander Gazarov,
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Copyright © 2012, SAS Institute Inc. All rights reserved. ANALYTICS IN BIG DATA ERA ANALYTICS TECHNOLOGY AND ARCHITECTURE TO MANAGE VELOCITY AND VARIETY,
Keystroke Authentication It’s All in How You Type John C. Checco BiometriTech 2003 bioChec™
The Second Life of a Sensor: Integrating Real-World Experience in Virtual Worlds using Mobile Phones Mirco Musolesi, Emiliano Miluzzo, Nicholas D. Lane,
Biometrics Authentication Technology
I can be You: Questioning the use of Keystroke Dynamics as Biometrics —Paper by Tey Chee Meng, Payas Gupta, Debin Gao Presented by: Kai Li Department of.
Biometrics and Retina Scan Technology Lum OSMANI Alex CHERVENKOV Course: Information Security April 2008.
Automated Solar Cavity Detection
Cognitive Radio: Next Generation Communication System
Providing User Context for Mobile and Social Networking Applications A. C. Santos et al., Pervasive and Mobile Computing, vol. 6, no. 1, pp , 2010.
Secure Unlocking of Mobile Touch Screen Devices by Simple Gestures – You can see it but you can not do it Muhammad Shahzad, Alex X. Liu Michigan State.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
Typing Pattern Authentication Techniques 3 rd Quarter Luke Knepper.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
By Diana Liwanag. Overview The problem What are biometrics? –What are the different types? Short video of a system with a fingerprinting device. Identifying.
CS 2310 Final Project - Driving Behavior Monitor Haifeng Xu Dec. 5, 2013.
Keystroke Dynamics By Hafez Barghouthi.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
 Using Touchloggers To Build User Profiles Through Machine Learning Craig Dezangle.
An Introduction to Biometrics
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
UWave: Accelerometer-based personalized gesture recognition and its applications Tae-min Hwang.
Signature Recognition Using Neural Networks and Rule Based Decision Systems CSC 8810 Computational Intelligence Instructor Dr. Yanqing Zhang Presented.
Done by Fazlun Satya Saradhi. INTRODUCTION The main concept is to use different types of agent models which would help create a better dynamic and adaptive.
Andromaly Verifying user activity on Android-powered devices using anomaly detection TeamTechnical advisorAcademic advisor Eran Rosenwig Gili Asis Asaf.
When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals Warren Yeu When CSI Meets Public Wifi.
When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals Adekemi Adedokun May 2, 2017.
Clickprints on the Web: Are there Signatures in Web Browsing Data?
Musical Instrument Virtual
MadeCR: Correlation-based Malware Detection for Cognitive Radio
Keystroke Biometric Studies
Authentication.
FACE RECOGNITION TECHNOLOGY
Home Automation System
A Framework for Automatic Resource and Accuracy Management in A Cloud Environment Smita Vijayakumar.
Seminar Presentation on Biometrics
Smita Vijayakumar Qian Zhu Gagan Agrawal
A SEMINAR REPORT ON BIOMETRICS
Dynamic Authentication of Typing Patterns
Human and Computer Interaction (H.C.I.) &Communication Skills
Statistical based IDS background introduction
Protection Mechanisms in Security Management
Neural Network Typing Authentication
Presentation transcript:

Unobtrusive Mobile User Recognition Patent by Seal Mobile ID Presented By: Aparna Bharati & Ashrut Bhatia

Motivation  Problem with passwords  Disadvantage of biometrics  Advanced HCI methods  Why not voice, gait and keystrokes ?

Introduction  Unobtrusively recognizing a user of a mobile device  Modern mobile devices are equipped with multiple sensors  Monitor HCI behavior patterns and combine to create “usage repertoires” that reflect unique behavior patterns of a specific individual user

Terminology 1.Motion State  Placement and speed determined from sensors 2.Motion Sequence  Collection of motion data extracted over period of time 3.Motion Characteristics  Aggregation of motion data in each motion sequence

Motion States

Terminology (contd.) 4.Motion Repertoire  Collection of motion characteristics captured while authorized usage 5.Differentiation Template  Set of motion characteristics that best differentiate user from population 6.Learning Stage Parameters  Trigger a defensive action/authenticate upon detecting unidentified motion-characteristics

Generating Differentiation Template  Calculate motion-characteristics of a plurality of users  Generate a differentiation score by comparing f(occurrence of each motion-characteristic of the user) to f(occurrence of the equivalent motion- characteristic of the population)  Generate differentiation-template for each user based on the differentiation scores

Continuous Monitoring Monitor Touch Events Touch Events Sample Touch Event Parameters Compare Motion Characteristics Discretize Parameters Motion Sequence Consistent with Prior usage Initial Learning mode Block Access Update Bayesian network Yes No Yes

Bayesian Network (basic)

Bayesian Network

Application of Machine Learning  Authorization - Compare motion-characteristics to a differentiation-template to recognize an authorized user:  For each motion-sequence, score each of the 16 characteristics based on the probability score in the differentiation-template.  Detection Score = ∑ 16 characteristic scores.  High score indicates the likelihood of the authorized user.

Other Statistical Techniques  Entropy method:  Chi-Squared Test:

User Recognition Collecting Motion Data from handheld device Determine motion state Demarcate series into motion sequence Calculate motion characteristics of auth. user Generate motion-repertoire of auth. user Determine motion data of new user Calculate motion char. of new user Compare current char. to motion repertoire of auth. user Trigger defense Provide authentication

Performance Evaluation  The accuracy is measured using FAR and FRR  System dynamically scales itself to provide balance b/w accuracy and device performance:  Time taken by calls to the server is determined  Time Field within server response indicating the time for subsequent requests  Advantages -The server is able to:  Avoid unnecessary API calls from devices  Gauge the degree of consistency of the template

Implementations “Quickdraw” runs as a background service on Android devices Monitors accelerometer activity Launches pre-configured activities when motion conditions are met

References    machine-learning-applications machine-learning-applications