THE way you use your smartphone is unique. By using software to profile how, where and when you use it, your phone may lock up if it looks like someone else has got hold of it.
Mike Just and colleagues at Glasgow Caledonian University, UK, created software that monitors which cellphone towers the owner is normally nearby, which Wi-Fi networks are in their vicinity, which apps they use and when they access them. The system also measures noise and light levels via the phone's microphone and light sensor, to learn what environmental patterns are particular to the device's owner (arxiv.org/abs/1410.7743).
"Your phone's loaded with sensors that can sense its environment and sense your behaviour," says Just.
It takes just over a week on average for the phone to model its user's behaviour and establish a profile of their activity. It then switches to a protective mode. Minor deviations from the norm are acceptable, but if the software detects big changes in how the phone is being used, the device demands a password.
During tests, the team found that if someone took the device to an unfamiliar location and began using it in a different way, the software requested a password within 3 minutes.
This article appeared in print under the headline "Smartphone can identify you from how you use it"
- Board index
- Search
-
- It is currently Mon Oct 27, 2025 4:22 pm
- All times are UTC+05:30
Phone thwarts thieves by learning its owner's habits
General Discussions
Return to “General Discussions”
Jump to
- Programmable Electronics
- ↳ Arduino
- ↳ Raspberry Pi
- ↳ Microcontrollers
- ↳ FPGA
- ↳ Digital Signal Processors
- ↳ Other
- Programming
- ↳ Web programming
- ↳ PHP & MySQL
- ↳ ASP & ASP.Net
- ↳ .Net & Other Programming
- ↳ .NET Programming
- ↳ Visual Basic Programming
- ↳ Java Programming
- ↳ C/C++ Programming
- Engineering
- ↳ Electronics & Electrical Engineering
- ↳ Embedded Systems
- ↳ Computer Science
- ↳ Software Engineering
- ↳ Data Structures & Algorithms
- ↳ Programming Languages & Compiler Theory
- ↳ Operating Systems
- ↳ Cryptography
- ↳ Computer Networks
- ↳ SQL & Database
- ↳ Computer Architecture
- ↳ Graphics & Vision
- ↳ Artificial Intelligence
- ↳ Neural Networks
- ↳ Multimedia
- ↳ Mathematics
- ↳ Other
- ↳ Control Systems & Robotics
- ↳ Mechanical
- ↳ Thermodynamics
- ↳ Fluid Dynamics
- ↳ Aerodynamics
- ↳ Manufacturing
- ↳ Energy
- ↳ Dynamics
- ↳ Statics
- ↳ Automobile
- ↳ Other
- ↳ Other
- Operating Systems
- ↳ Windows
- ↳ Linux
- ↳ Mac OS
- ↳ Android
- ????? ????
- ↳ ???????? ?????
- ↳ ??????? ???? ?????
- ↳ ????? ?????? ???? (Buy Guide)
- ↳ ??????? ???? ??????? (Where to buy)
- ↳ ????????? ???????? (Recommend - Complain - Review)
- General
- ↳ News & Announcements
- ↳ General Discussions
- ↳ Viruses, Trojans, Spyware and Adware
- ↳ Computer & Network Security
- ↳ Web Related
- Members Zone
- ↳ Project Assistance
- ↳ Advertising
- ↳ Jobs & Investment Opportunities
- ↳ Introductions
- ↳ Presents & Donations
- ↳ Entertainment
- ↳ Music & Albums
- ↳ Movies
- ↳ Games

