Generation of keyboard handwriting during user authentication on mobile devices
https://doi.org/10.32362/2500-316X-2023-11-6-7-15
Abstract
Objectives. This article discusses a new way of generating keyboard handwriting using a touch keyboard for authentication in currently existing mobile systems.
Methods. Due to the insufficient reliability of single password authentication, the proposal is to use it in combination with characteristics which correspond to handwriting on mobile devices. This article demonstrates the possibility of using individual user characteristics in the formulation of keyboard handwriting on devices with touch keyboards. The type of keyboard used affects the characteristics of keyboard handwriting, so this aspect can be used to improve password authentication reliability. The authentication process in the information environment can be supplemented with data on the nature of the impact on a touch keyboard. The use of the built-in 3D Touch function is also of interest. This is available when working on mobile devices and appliances equipped with a touch keyboard. The paper demonstrates that the use of one parameter only is insufficient for accurate authentication. The study proposes a method of determining an acceptable error range for both the touch force and the intermediate interval during authentication. For this purpose, the Laplace function which formulates the interval of each characteristic depending on the required probability of user recognition is used.
Results. Touch force and the intermediate interval are sufficient to obtain the necessary characteristics, in order to formulate a refined user portrait depending on the user’s keyboard handwriting. Experimental statistics are given separately for an average sample of three different users depending on touch force. They also provide the results of authentication when using both standard deviations of pressing and the intervals when using the touch keyboard for the iOSXcode platform.
Conclusions. The conclusion relates to the possibility of user authentication by keyboard handwriting, formulated on the basis of both the touch force on the keyboard symbols and intervals between pressing. Using the values of the sample mean and standard deviations allows authentication according to the required recognition probability.
About the Authors
S. M. IvanovaRussian Federation
Svetlana M. Ivanova, Cand. Sci. (Eng.), Associate Professor, Department of Digital Data Processing Technologies, Institute for Cybersecurity and Digital Technologies
Scopus Author ID 36935727700
78, Vernadskogo pr., Moscow, 119454
Competing Interests:
The authors declare no conflicts of interest.
Z. V. Ilyichenkova
Russian Federation
Zoya V. Ilyichenkova, Cand. Sci. (Eng.), Associate Professor, Department of Digital Data Processing Technologies, Institute for Cybersecurity and Digital Technologies
Scopus Author ID 6505467030
78, Vernadskogo pr., Moscow, 119454
Competing Interests:
The authors declare no conflicts of interest.
References
1. Ilyichenkova Z.V., Ivanova S.M. Identification of Dynamic Object Parameters. Nuclear Instruments and Methods in Physics Research. Section A: Accelerators, Spectrometers, Detectors and Associated Equipment. 2003;502(2–3):535–536. http://doi.org/10.1016/S0168-9002(03)00493-5
2. Khant K.Z., Sosenushkin S. Big data analysis model for the implementation of smart universities. Sovremennaya nauka: aktual’nye problemy teorii i praktiki. Seriya: Estestvennye i tekhnicheskie nauki = Modern Science: Actual Problems of Theory and Practice. Series of “Natural and Technical Sciences.” 2021;8: 72–75 (in Russ.). http://doi.org/10.37882/2223-2966.2021.08.17
3. Ilyichenkova Z.V., Ivanova S.M. Cluster keyboard handwriting. Procedia Computer Science. 2021;186: 395–402. https://doi.org/10.1016/j.procs.2021.04.162
4. Gorbukhov N.N., Magomedov Sh.G. Comparison of mobile app builders. In: KhRONIKI TsIFROVYKh TRANSFORMATsII: Materialy mezhkafedral’nogo kruglogo stola (CHRONICLES OF DIGITAL TRANSFORMATIONS. Materials of the Inter-Cathedral Round Table). V. 4. Volgograd. 2022. P. 44–49 (in Russ.).
5. Nikolsky S.N. The task of automation and evolutionary modeling. Shkola Nauki = School of Science. 2022;1(50):3–7 (in Russ.). https://doi.org/10.5281/zenodo.5914537
6. Antonova I.I., Antonova A.A., Shmeleva A.N., Novikov A.A., Nazarenko M.A. System Analysis of Transport-Information Infrastructure Transformation in Modern Cities. In: 2020 International Conference Quality Management, Transport and Information Security, Information Technologies (IT&QM&IS). Yaroslavl, Russia. 2020. P. 154–156. http://dx.doi.org/10.1109/ITQMIS51053.2020.9322902
7. Ermakova A.Y., Los A.B. On risk assessment when analyzing the effectiveness of information protection algorithms. Matematicheskoe i komp’yuternoe modelirovanie v ekonomike, strakhovanii i upravlenii riskami = Mathematical and Computer Modeling in Economics, Insurance and Risk Management. 2022;7: 64–70 (in Russ.). Available from URL: https://www.sgu.ru/sites/default/files/textdocsfiles/2022/12/21/013.pdf
8. Kuronen T., Eerola T., Lensu L., Kälviäinen H., Häkkinen J. 3D hand movement measurement framework for studying human-computer interaction. In: Arseniev D., Overmeyer L., Kälviäine H., Katalini B. (Eds.). Cyber-Physical Systems and Control (CPS&C 2019). Lecture Notes in Networks and Systems. V. 95. Springer, Cham.; 2019. P. 513–524. http://doi.org/10.1007/978-3-030-34983-7_50
9. Kuronen T., Eerola T., Lensu L., Kälviäinen H. Two-Camera Synchronization and Trajectory Reconstruction for a Touch Screen Usability Experiment. In: Blanc-Talon J., Helbert D., Philips W., Popescu D., Scheunders P. (Eds.). Advanced Concepts for Intelligent Vision Systems (ACIVS 2018). Lecture Notes in Computer Science. V. 11182. Springer, Cham.; 2018. P. 125–136. https://doi.org/10.1007/978-3-030-01449-0_11
10. Stroganov D.V., Sakun B.V., Yartsev M.I. General Principles of Assessment of Staff Skills Building Specialties. Int. J. Adv. Studies. 2016;6(4):63–76. https://doi.org/10.12731/2227-930X-2016-4-63-76
11. Volkov A.I., Semin V.G., Semin V.V. Fuzzy sets in the problems of assessing the quality of mobile applications. In: 2021 International Conference on Quality Management, Transport and Information Security, Information Technologies (IT&QM&IS). Yaroslavl, Russia. 2021. P. 355–358. https://doi.org/10.1109/ITQMIS53292.2021.9642873
12. Ivanova S.M., Ilyichenkova Z.V., Antonova A.A. Keyboard handwriting analysis in the learning systems. Vestnik komp’yuternykh i informatsionnykh tekhnologii = Herald of Computer and Information Echnologies. 2020;17;6(192):22–30 (in Russ.). https://doi.org/10.14489/vkit.2020.06.pp.022-030
13. Aleshnikova E.A., Chadina Yu.A. The Axiological Approach in Teaching High School Students Reading Comprehension at Russian Language Lessons. Russkii yazyk v shkole = Russian Language at School. 2019;80(1):46–49 (in Russ.). https://doi.org/10.30515/0131-6141-2019-80-1-46-49
14. Sarkisova I.O., Laverychev M.A. Analysis of the influence of the location of NFC tags on the occurrence of collisions. Sovremennaya nauka: aktual’nye problemy teorii i praktiki. Seriya: Estestvennye i tekhnicheskie nauki = Modern Science: Actual Problems of Theory and Practice. Series of “Natural and Technical Sciences.” 2022;8:119–124 (in Russ.). Available from URL: https://elibrary.ru/item.asp?id=49623257
15. Pronin C.B., Maksimychev O.I., Ostroukh A.V., Volosova A.V., Matukhina E.N. Creating quantum circuits for training perceptron neural networks on the principles of Grover’s algorithm. In: 2022 Systems of Signals Generating and Processing in the Field of on Board Communications. Moscow, Russia. 2022. 5 p. https://doi.org/10.1109/IEEECONF53456.2022.9744279
16. Ivanova S.M., Ilyichenkova Z.V., Antonova A.A. User Authentication in Training Systems. Informacionnye tekhnologii = Information Technologies. 2020;26(11): 648–654 (in Russ.). https://doi.org/10.17587/it.26.648-654
17. Matyukhin B.N., Matyukhina E.N., Chistyakova M.A., Morozov E.A. Mathematical models of objects of diagnosis. Promyshlennye ASU i kontrollery = Industrial Automatic Control Systems and Controllers. 2021;5: 29–32 (in Russ.). https://doi.org/10.25791/asu.5.2021.1280
18. Karimov M.T., Nikonov V.V. Performance comparison of convolutional neural network models on a GPU. Informatsionnye i telekommunikatsionnye tekhnologii = Information and Telecommunication Technologies. 2021;52:42–48 (in Russ.).
19. Savinykh V.P., Gospodinov S.G., Kudzh S.A., TsvetkovV.Ya., Deshko I.P. Semantics of visual models in space research. Russ. Technol. J. 2022;10;2(46):51–58 (in Russ.). https://doi.org/10.32362/2500-316X-2022-10-2-51-58
20. Chekushin A.V., Kotilevets I.D., Ivanova I.A., Chistyakova M.A. Handling hardware interrupts using the ATmega16 microcontroller as an example. Promyshlennye ASU i kontrollery = Industrial Automatic Control Systems and Controllers. 2022;1:33–39 (in Russ.). https://doi.org/10.25791/asu.1.2022.1341
Supplementary files
|
1. Permissible touch force ranges | |
Subject | ||
Type | Исследовательские инструменты | |
View
(7KB)
|
Indexing metadata ▾ |
- This article discusses a new way of generating keyboard handwriting using a touch keyboard for authentication in currently existing mobile systems.
- Touch force and the intermediate interval are sufficient to obtain the necessary characteristics, in order to formulate a refined user portrait depending on the user’s keyboard handwriting.
- Experimental statistics are given separately for an average sample of three different users depending on touch force. They also provide the results of authentication when using both standard deviations of pressing and the intervals when using the touch keyboard for the iOSXcode platform.
Review
For citations:
Ivanova S.M., Ilyichenkova Z.V. Generation of keyboard handwriting during user authentication on mobile devices. Russian Technological Journal. 2023;11(6):7-15. https://doi.org/10.32362/2500-316X-2023-11-6-7-15