Personal identification techniques based on operational habit of cellular phone

Takamasa Isohara, Keisuke Takemori, Iwao Sasase

Research output: Contribution to conferencePaper

Abstract

Biometrics authentication which identifies a legitimate user of a cellular phone has been adopted. However, it is not used so actively, because control procedure is complicated, and a user has a resistance to provide own biological information to the communication terminal. In this paper, we propose personal identification techniques based on operational habit of cellular phone, which authenticate the legitimate user by collecting typing histories of cellular phone in a background process. The typing histories that are recorded in the ring buffer are divided into two profiles. One is "short term profile" which is histories from latest typing, and the other is "long term profile" which are older histories than the short term records. Also, we implement two authentication algorithms; first algorithm retrieves a remarkable key of the short term profile from the long term profile. Second algorithm computes weight values of keys of the short term profile by using long term profile. We evaluate the FAR (False Acceptance Rate) and FRR (False Reject Rate), and we show that our method can apply to personal identification on the cellular phone.

Original languageEnglish
Pages459-465
Number of pages7
Publication statusPublished - 2006 Dec 1
Event1st International Multiconference on Computer Science and Information Technology, IMCSIT 2006. Part of 22nd Autumn Meeting of Polish Information Processing Society, PIPS - Wisla, Poland
Duration: 2006 Nov 62006 Nov 10

Other

Other1st International Multiconference on Computer Science and Information Technology, IMCSIT 2006. Part of 22nd Autumn Meeting of Polish Information Processing Society, PIPS
CountryPoland
CityWisla
Period06/11/606/11/10

Keywords

  • Biometrics authentication
  • Cellular phone
  • Operational habit

ASJC Scopus subject areas

  • Computer Science (miscellaneous)
  • Information Systems

Fingerprint Dive into the research topics of 'Personal identification techniques based on operational habit of cellular phone'. Together they form a unique fingerprint.

  • Cite this

    Isohara, T., Takemori, K., & Sasase, I. (2006). Personal identification techniques based on operational habit of cellular phone. 459-465. Paper presented at 1st International Multiconference on Computer Science and Information Technology, IMCSIT 2006. Part of 22nd Autumn Meeting of Polish Information Processing Society, PIPS, Wisla, Poland.