In Implicit authentication (IA), user behaviors (raw) data are captured by various
sensors embedded in the smart device, and stored in the database preparing for further processing. After filtering out noise and selecting suitable features, the data will be sent to machine learning tool(s) which will train and return a fine-tuned model back to smart device. The smart device then uses the model as signature to identify the current user. Due to the battery and computation limitation of smart device, the training phase, in which most of the computations are carried out, is usually implemented in the remote server. Some lightweight algorithms, e.g.,
Kl divergence, are implemented in the local device as parts of real-time authentication units which control lock mechanism of the device. The developing of IA model largely depends on the operating systems, which usually adopt
Android and
iOS, and there are two different approaches to establish IA model, which are device-centric and application-centric. Device-centric approaches, as the traditional way to establish IA model, leverage most of the information gathered by operating system from various sensors, and IA model is directly running above the
operating system. Application-centric approaches however achieve IA through establishing individual framework in each app, which executes independently in the
sandbox, and it preserves the intrinsic structure of operating system, while simplifies IA developing. == History ==