Profile
International Journal of Computer & Software Engineering Volume 2 (2017), Article ID 2:IJCSE-113, 5 pages
https://doi.org/10.15344/2456-4451/2017/113
Review Article
Protecting Smartphones Based on Usage Patterns

Weifeng Chen

Department of Mathematics, Computer Science and Information Systems, California University of Pennsylvania, California, PA 15419, USA
Dr. Weifeng Chen, Department of Mathematics, Computer Science and Information Systems, California University of Pennsylvania, California, PA 15419, USA; E-mail: chen@calu.edu
19 November 2016; 16 April 2017; 18 April 2017
Chen W (2017) Protecting Smartphones Based on Usage Patterns. Int J Comput Softw Eng 2: 113. doi: https://doi.org/10.15344/2456-4451/2017/113

Abstract

Due to the rapid developments of cloud technologies, mobile devices, especially smartphones, have become much more powerful, bringing people great convenience. People can do many things on their smartphones: checking email, updating Facebook/Snapchat/Instagram, or shopping via different apps. With all these applications, people tend to access their smartphones frequently and instantly, i.e., they want to use the phone right away. On the other hand, more and more sensitive information is now stored or accessible on smartphones such as Visa Signature or Paypal apps. Smartphones need to be protected more than ever before.

How to protect smartphones while still provide convenience becomes a challenging problem. In this paper, we describe an approach aiming to solve this problem. The approach provides an authentication framework to protect smartphones. This authentication framework requires stronger authentication to accesses that are classified as suspicious, whereas still offers quick access for those authentic.