Preview

Russian Technological Journal

Advanced search

Generation of keyboard handwriting during user authentication on mobile devices

https://doi.org/10.32362/2500-316X-2023-11-6-7-15

Abstract

Objectives. This article discusses a new way of generating keyboard handwriting using a touch keyboard for authentication in currently existing mobile systems.

Methods. Due to the insufficient reliability of single password authentication, the proposal is to use it in combination with characteristics which correspond to handwriting on mobile devices. This article demonstrates the possibility of using individual user characteristics in the formulation of keyboard handwriting on devices with touch keyboards. The type of keyboard used affects the characteristics of keyboard handwriting, so this aspect can be used to improve password authentication reliability. The authentication process in the information environment can be supplemented with data on the nature of the impact on a touch keyboard. The use of the built-in 3D Touch function is also of interest. This is available when working on mobile devices and appliances equipped with a touch keyboard. The paper demonstrates that the use of one parameter only is insufficient for accurate authentication. The study proposes a method of determining an acceptable error range for both the touch force and the intermediate interval during authentication. For this purpose, the Laplace function which formulates the interval of each characteristic depending on the required probability of user recognition is used.

Results. Touch force and the intermediate interval are sufficient to obtain the necessary characteristics, in order to formulate a refined user portrait depending on the user’s keyboard handwriting. Experimental statistics are given separately for an average sample of three different users depending on touch force. They also provide the results of authentication when using both standard deviations of pressing and the intervals when using the touch keyboard for the iOSXcode platform.

Conclusions. The conclusion relates to the possibility of user authentication by keyboard handwriting, formulated on the basis of both the touch force on the keyboard symbols and intervals between pressing. Using the values of the sample mean and standard deviations allows authentication according to the required recognition probability.

About the Authors

S. M. Ivanova
MIREA – Russian Technological University
Russian Federation

Svetlana M. Ivanova, Cand. Sci. (Eng.), Associate Professor, Department of Digital Data Processing Technologies, Institute for Cybersecurity and Digital Technologies 
Scopus Author ID 36935727700 

78, Vernadskogo pr., Moscow, 119454


Competing Interests:

The authors declare no conflicts of interest.



Z. V. Ilyichenkova
MIREA – Russian Technological University
Russian Federation

Zoya V. Ilyichenkova, Cand. Sci. (Eng.), Associate Professor, Department of Digital Data Processing Technologies, Institute for Cybersecurity and Digital Technologies 
Scopus Author ID 6505467030 

78, Vernadskogo pr., Moscow, 119454


Competing Interests:

The authors declare no conflicts of interest.



References

1. Ilyichenkova Z.V., Ivanova S.M. Identification of Dynamic Object Parameters. Nuclear Instruments and Methods in Physics Research. Section A: Accelerators, Spectrometers, Detectors and Associated Equipment. 2003;502(2–3):535–536. http://doi.org/10.1016/S0168-9002(03)00493-5

2. Khant K.Z., Sosenushkin S. Big data analysis model for the implementation of smart universities. Sovremennaya nauka: aktual’nye problemy teorii i praktiki. Seriya: Estestvennye i tekhnicheskie nauki = Modern Science: Actual Problems of Theory and Practice. Series of “Natural and Technical Sciences.” 2021;8: 72–75 (in Russ.). http://doi.org/10.37882/2223-2966.2021.08.17

3. Ilyichenkova Z.V., Ivanova S.M. Cluster keyboard handwriting. Procedia Computer Science. 2021;186: 395–402. https://doi.org/10.1016/j.procs.2021.04.162

4. Gorbukhov N.N., Magomedov Sh.G. Comparison of mobile app builders. In: KhRONIKI TsIFROVYKh TRANSFORMATsII: Materialy mezhkafedral’nogo kruglogo stola (CHRONICLES OF DIGITAL TRANSFORMATIONS. Materials of the Inter-Cathedral Round Table). V. 4. Volgograd. 2022. P. 44–49 (in Russ.).

5. Nikolsky S.N. The task of automation and evolutionary modeling. Shkola Nauki = School of Science. 2022;1(50):3–7 (in Russ.). https://doi.org/10.5281/zenodo.5914537

6. Antonova I.I., Antonova A.A., Shmeleva A.N., Novikov A.A., Nazarenko M.A. System Analysis of Transport-Information Infrastructure Transformation in Modern Cities. In: 2020 International Conference Quality Management, Transport and Information Security, Information Technologies (IT&QM&IS). Yaroslavl, Russia. 2020. P. 154–156. http://dx.doi.org/10.1109/ITQMIS51053.2020.9322902

7. Ermakova A.Y., Los A.B. On risk assessment when analyzing the effectiveness of information protection algorithms. Matematicheskoe i komp’yuternoe modelirovanie v ekonomike, strakhovanii i upravlenii riskami = Mathematical and Computer Modeling in Economics, Insurance and Risk Management. 2022;7: 64–70 (in Russ.). Available from URL: https://www.sgu.ru/sites/default/files/textdocsfiles/2022/12/21/013.pdf

8. Kuronen T., Eerola T., Lensu L., Kälviäinen H., Häkkinen J. 3D hand movement measurement framework for studying human-computer interaction. In: Arseniev D., Overmeyer L., Kälviäine H., Katalini B. (Eds.). Cyber-Physical Systems and Control (CPS&C 2019). Lecture Notes in Networks and Systems. V. 95. Springer, Cham.; 2019. P. 513–524. http://doi.org/10.1007/978-3-030-34983-7_50

9. Kuronen T., Eerola T., Lensu L., Kälviäinen H. Two-Camera Synchronization and Trajectory Reconstruction for a Touch Screen Usability Experiment. In: Blanc-Talon J., Helbert D., Philips W., Popescu D., Scheunders P. (Eds.). Advanced Concepts for Intelligent Vision Systems (ACIVS 2018). Lecture Notes in Computer Science. V. 11182. Springer, Cham.; 2018. P. 125–136. https://doi.org/10.1007/978-3-030-01449-0_11

10. Stroganov D.V., Sakun B.V., Yartsev M.I. General Principles of Assessment of Staff Skills Building Specialties. Int. J. Adv. Studies. 2016;6(4):63–76. https://doi.org/10.12731/2227-930X-2016-4-63-76

11. Volkov A.I., Semin V.G., Semin V.V. Fuzzy sets in the problems of assessing the quality of mobile applications. In: 2021 International Conference on Quality Management, Transport and Information Security, Information Technologies (IT&QM&IS). Yaroslavl, Russia. 2021. P. 355–358. https://doi.org/10.1109/ITQMIS53292.2021.9642873

12. Ivanova S.M., Ilyichenkova Z.V., Antonova A.A. Keyboard handwriting analysis in the learning systems. Vestnik komp’yuternykh i informatsionnykh tekhnologii = Herald of Computer and Information Echnologies. 2020;17;6(192):22–30 (in Russ.). https://doi.org/10.14489/vkit.2020.06.pp.022-030

13. Aleshnikova E.A., Chadina Yu.A. The Axiological Approach in Teaching High School Students Reading Comprehension at Russian Language Lessons. Russkii yazyk v shkole = Russian Language at School. 2019;80(1):46–49 (in Russ.). https://doi.org/10.30515/0131-6141-2019-80-1-46-49

14. Sarkisova I.O., Laverychev M.A. Analysis of the influence of the location of NFC tags on the occurrence of collisions. Sovremennaya nauka: aktual’nye problemy teorii i praktiki. Seriya: Estestvennye i tekhnicheskie nauki = Modern Science: Actual Problems of Theory and Practice. Series of “Natural and Technical Sciences.” 2022;8:119–124 (in Russ.). Available from URL: https://elibrary.ru/item.asp?id=49623257

15. Pronin C.B., Maksimychev O.I., Ostroukh A.V., Volosova A.V., Matukhina E.N. Creating quantum circuits for training perceptron neural networks on the principles of Grover’s algorithm. In: 2022 Systems of Signals Generating and Processing in the Field of on Board Communications. Moscow, Russia. 2022. 5 p. https://doi.org/10.1109/IEEECONF53456.2022.9744279

16. Ivanova S.M., Ilyichenkova Z.V., Antonova A.A. User Authentication in Training Systems. Informacionnye tekhnologii = Information Technologies. 2020;26(11): 648–654 (in Russ.). https://doi.org/10.17587/it.26.648-654

17. Matyukhin B.N., Matyukhina E.N., Chistyakova M.A., Morozov E.A. Mathematical models of objects of diagnosis. Promyshlennye ASU i kontrollery = Industrial Automatic Control Systems and Controllers. 2021;5: 29–32 (in Russ.). https://doi.org/10.25791/asu.5.2021.1280

18. Karimov M.T., Nikonov V.V. Performance comparison of convolutional neural network models on a GPU. Informatsionnye i telekommunikatsionnye tekhnologii = Information and Telecommunication Technologies. 2021;52:42–48 (in Russ.).

19. Savinykh V.P., Gospodinov S.G., Kudzh S.A., TsvetkovV.Ya., Deshko I.P. Semantics of visual models in space research. Russ. Technol. J. 2022;10;2(46):51–58 (in Russ.). https://doi.org/10.32362/2500-316X-2022-10-2-51-58

20. Chekushin A.V., Kotilevets I.D., Ivanova I.A., Chistyakova M.A. Handling hardware interrupts using the ATmega16 microcontroller as an example. Promyshlennye ASU i kontrollery = Industrial Automatic Control Systems and Controllers. 2022;1:33–39 (in Russ.). https://doi.org/10.25791/asu.1.2022.1341


Supplementary files

1. Permissible touch force ranges
Subject
Type Исследовательские инструменты
View (7KB)    
Indexing metadata ▾
  • This article discusses a new way of generating keyboard handwriting using a touch keyboard for authentication in currently existing mobile systems.
  • Touch force and the intermediate interval are sufficient to obtain the necessary characteristics, in order to formulate a refined user portrait depending on the user’s keyboard handwriting.
  • Experimental statistics are given separately for an average sample of three different users depending on touch force. They also provide the results of authentication when using both standard deviations of pressing and the intervals when using the touch keyboard for the iOSXcode platform.

Review

For citations:


Ivanova S.M., Ilyichenkova Z.V. Generation of keyboard handwriting during user authentication on mobile devices. Russian Technological Journal. 2023;11(6):7-15. https://doi.org/10.32362/2500-316X-2023-11-6-7-15

Views: 693


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2782-3210 (Print)
ISSN 2500-316X (Online)