Biometrics authentication which identifies a legitimate user of a cellular phone has been adopted. However, it is not used so actively, because control procedure is complicated, and a user has a resistance to provide own biological information to the communication terminal. In this paper, we propose personal identification techniques based on operational habit of cellular phone, which authenticate the legitimate user by collecting typing histories of cellular phone in a background process. The typing histories that are recorded in the ring buffer are divided into two profiles. One is "short term profile" which is histories from latest typing, and the other is "long term profile" which are older histories than the short term records. Also, we implement two authentication algorithms; first algorithm retrieves a remarkable key of the short term profile from the long term profile. Second algorithm computes weight values of keys of the short term profile by using long term profile. We evaluate the FAR (False Acceptance Rate) and FRR (False Reject Rate), and we show that our method can apply to personal identification on the cellular phone.
|出版ステータス||Published - 2006 12月 1|
|イベント||1st International Multiconference on Computer Science and Information Technology, IMCSIT 2006. Part of 22nd Autumn Meeting of Polish Information Processing Society, PIPS - Wisla, Poland|
継続期間: 2006 11月 6 → 2006 11月 10
|Other||1st International Multiconference on Computer Science and Information Technology, IMCSIT 2006. Part of 22nd Autumn Meeting of Polish Information Processing Society, PIPS|
|Period||06/11/6 → 06/11/10|
ASJC Scopus subject areas
- コンピュータ サイエンス（その他）