Abstract
Since mobile devices have become an inseparable part of peoples’ lives, gathering user profiles from mobile devices can provide a better grasp of the device ownership. Mobile user profiling is done by focusing on information that can be used to authenticate the real owner of a device. A novel human-machine authentication mechanism is proposed. This objective is achieved via profiling of the user through his or her interaction with a virtual pet that resides on the mobile device to provide robust, intelligent, continuous and transparent authentication of the user. Virtual pets that reside in devices can turn phones into ‘sentient beings’ and are able to analyse the users’ behaviour through constant interaction with them.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Murase, T., Maeda, T., Matsunaga, S.: Computer readable medium recording handwritten signature authentication program, and handwritten signature authentication method apparatus. 7206436 US Patent (2007)
Gaines, M., Kardamilas, C., Livengood, S.: System and method of user authentication using handwritten signatures for an MFP. 20080005579 US Patent (2008)
Choyi, V., Marquet, B.: Mobile phone locking system using multiple biometric factors for owner authentication. 20080005575 US Patent (2008)
Nicholson, A.J., Corner, M.D., Noble, B.D.: Mobile Device Security Using Transient Authentication. IEEE Transactions on Mobile Computing 5(11), 1489–1502 (2006)
Clarke, N.L., Furnell, S.M.: Authenticating mobile phone users using keystroke analysis. Source International Journal of Information Security 6(1) (December 2006)
Stajano, F.: One User, Many Hats; and, Sometimes, No Hat: Towards a Secure Yet Usable PDA. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2004. LNCS, vol. 3957, pp. 51–64. Springer, Heidelberg (2006)
Briggs, P., Olivier, P.L.: Biometric Daemons: Authentication via electronic pets. In: CHI 2008 Extended Abstracts on Human Factors in Computing Systems. ACM (2008)
Nilton, B., et al.: Mobile User Profile Acquisition Through Network Observables and Explicit User Queries. In: The Ninth International Conference on Mobile Data Management. IEEE CS (2008)
Bartolomeo, G., et al.: Handling User Profiles for the Secure and Convenient Configuration and Management of Mobile Terminal Services. In: Proceeding of The Sixteenth International Workshop on Database and Expert Systems Applications (2005)
Akihiro, Y.: Breeding, Simulation Apparatus for Virtual Creatures. 7104884 US Patent (2006)
Rosenberg, L.B.: Methods and Apparatus for Providing Haptic Feedback in Interacting with Virtual Pets. 0080987 US Patent (2003)
Zheng, Y., Xia, J., He, D.: Trusted User Authentication Scheme Combining Password with Fingerprint for Mobile Devices. In: International Symposium on Biometrics and Security Technologies (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yun Lim, S., Kho, J.N.M. (2011). User Profiling with Virtual Pet for Mobile Device Authentication. In: Abd Manaf, A., Zeki, A., Zamani, M., Chuprat, S., El-Qawasmeh, E. (eds) Informatics Engineering and Information Science. ICIEIS 2011. Communications in Computer and Information Science, vol 251. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25327-0_20
Download citation
DOI: https://doi.org/10.1007/978-3-642-25327-0_20
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-25326-3
Online ISBN: 978-3-642-25327-0
eBook Packages: Computer ScienceComputer Science (R0)