Skip to main content

User Profiling with Virtual Pet for Mobile Device Authentication

  • Conference paper
Informatics Engineering and Information Science (ICIEIS 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 251))

  • 1089 Accesses

Abstract

Since mobile devices have become an inseparable part of peoples’ lives, gathering user profiles from mobile devices can provide a better grasp of the device ownership. Mobile user profiling is done by focusing on information that can be used to authenticate the real owner of a device. A novel human-machine authentication mechanism is proposed. This objective is achieved via profiling of the user through his or her interaction with a virtual pet that resides on the mobile device to provide robust, intelligent, continuous and transparent authentication of the user. Virtual pets that reside in devices can turn phones into ‘sentient beings’ and are able to analyse the users’ behaviour through constant interaction with them.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Murase, T., Maeda, T., Matsunaga, S.: Computer readable medium recording handwritten signature authentication program, and handwritten signature authentication method apparatus. 7206436 US Patent (2007)

    Google Scholar 

  2. Gaines, M., Kardamilas, C., Livengood, S.: System and method of user authentication using handwritten signatures for an MFP. 20080005579 US Patent (2008)

    Google Scholar 

  3. Choyi, V., Marquet, B.: Mobile phone locking system using multiple biometric factors for owner authentication. 20080005575 US Patent (2008)

    Google Scholar 

  4. Nicholson, A.J., Corner, M.D., Noble, B.D.: Mobile Device Security Using Transient Authentication. IEEE Transactions on Mobile Computing 5(11), 1489–1502 (2006)

    Article  Google Scholar 

  5. Clarke, N.L., Furnell, S.M.: Authenticating mobile phone users using keystroke analysis. Source International Journal of Information Security 6(1) (December 2006)

    Google Scholar 

  6. Stajano, F.: One User, Many Hats; and, Sometimes, No Hat: Towards a Secure Yet Usable PDA. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2004. LNCS, vol. 3957, pp. 51–64. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  7. Briggs, P., Olivier, P.L.: Biometric Daemons: Authentication via electronic pets. In: CHI 2008 Extended Abstracts on Human Factors in Computing Systems. ACM (2008)

    Google Scholar 

  8. Nilton, B., et al.: Mobile User Profile Acquisition Through Network Observables and Explicit User Queries. In: The Ninth International Conference on Mobile Data Management. IEEE CS (2008)

    Google Scholar 

  9. Bartolomeo, G., et al.: Handling User Profiles for the Secure and Convenient Configuration and Management of Mobile Terminal Services. In: Proceeding of The Sixteenth International Workshop on Database and Expert Systems Applications (2005)

    Google Scholar 

  10. Akihiro, Y.: Breeding, Simulation Apparatus for Virtual Creatures. 7104884 US Patent (2006)

    Google Scholar 

  11. Rosenberg, L.B.: Methods and Apparatus for Providing Haptic Feedback in Interacting with Virtual Pets. 0080987 US Patent (2003)

    Google Scholar 

  12. Zheng, Y., Xia, J., He, D.:   Trusted User Authentication Scheme Combining Password with Fingerprint for Mobile Devices. In: International Symposium on Biometrics and Security Technologies (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yun Lim, S., Kho, J.N.M. (2011). User Profiling with Virtual Pet for Mobile Device Authentication. In: Abd Manaf, A., Zeki, A., Zamani, M., Chuprat, S., El-Qawasmeh, E. (eds) Informatics Engineering and Information Science. ICIEIS 2011. Communications in Computer and Information Science, vol 251. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25327-0_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-25327-0_20

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-25326-3

  • Online ISBN: 978-3-642-25327-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics