Touch Pattern Analysis of APP Browsing in Mobile Device

碩士 === 國立臺北科技大學 === 電資碩士在職專班研究所 === 103 === It has become much easier to access to the information than before contributing to the popularity of the smart mobile devices booming in recent years. In the time of WEB2.0, people interact with each other by mobile data traffic and also obtaining the info...

Full description

Bibliographic Details
Main Authors: Wang Sung Huai, 汪嵩懷
Other Authors: 黃有評
Format: Others
Language:zh-TW
Online Access:http://ndltd.ncl.edu.tw/handle/uz44x6
Description
Summary:碩士 === 國立臺北科技大學 === 電資碩士在職專班研究所 === 103 === It has become much easier to access to the information than before contributing to the popularity of the smart mobile devices booming in recent years. In the time of WEB2.0, people interact with each other by mobile data traffic and also obtaining the information they want through the various (detectors or) sensors on the mobile devices. In this era that is generated data with the explosive growth, it’s of great importance to protect of the user’s data. In general, the security mechanism of Android Application is activated by creating passwords, or by the Fingerprint Identification System. The first method relies on the memory which is a burden for the elderly and most of the users are used to having characteristics of singularity and regularity on the password setting. The AFIS is usually built-in on high-priced smartphones and it’s unpopular. Therefore, this article presents you the research by analyzing the habits the ways users operate Android Application. Through the ways users utilize App, build up the private authentication key from the data of swiping speed, coordination, and pressure. The key will recognize users without any users ‘memories, passwords, login interfaces, or any responses from the users. The administrator will stop and terminate the account once it finds out the key of the present user doesn’t meet the key of the former user in case of any further loses.