文献与学术论文读后感怎么写?( 六 )
1、一切事物的发展都是循序渐进的 , 手机行业发展到今天已经相当的辉煌 。但是伴随着事物的发展也会相应的提出一系列新的问题 , 我们要在遵循客观规律的基础上突出人的主观能动性 , 而不要想着一蹴而就 。
2、科研的道路是曲折的 , 但前途是光明的 。
3、任何技术都有其优点和缺点 。在论文中提到了很多新兴的手机验证技术 , 这些技术都各有所长 , 但却都不是完美的 。我们只有正视这些缺点 , 取长补短 , 才能促进手机验证领域的更好更快发展 。
4、手机验证行业的价值 。手机产业的高速发展 , 带来了验证技术的空前繁荣 , 但危害手机安全性的事件也在不断发送 , 手机安全验证的形势是严峻的 。我们应该从人的角度出发 , 以人为本 , 只有如此才能设计出更好的产品供用户使用 。
总之 , 正如一句名言所说:读一本好书就像和一个高尚的人说话 。我相信站在巨人的肩膀上才能有更高的成就 , 我以后要多读书 , 读好书 , 不断提高科研水平和自身修养 , 尽量为中国的科研事业做出自己力所能及的贡献 。
The book I read the title of the paper is the progreive authentication: deciding when to authenticate on mobile phones ", this is a recommended by the China Computer Federation International Academic Conference and journal papers, published in the USENIX conference.This paper comprehensively discues some new developments in the field of mobile phone authentication in recent years, and puts forward its own views and perspectives on the security and convenience of the current mobile phone authentication methods.The paper points out that the traditional verification methods are not in line with the needs of most mobile phone users, only a more intelligent means is the future development trend of the mobile phone industry.The viewpoint is bright, argument is clear and strong, argument is sufficient and reliable, data is accurate, detailed information, literature review rich and normative, which the party about cell phone safety verification has quite high new insights.The following brief introduction is as follows: First, security and availability In this paper, the current use of mobile phone population satisfaction conducted a detailed investigation and analysis, found that more than 60% of the mobile phone users will not use PIN.One aspect of this phenomenon is that users feel that the verification method is too cumbersome, on the other hand also shows that users of their mobile phone security is the lack of correct understanding.This paper referred to the "All-or-nothing" verification, namely all validation, or are not verified, this also is is most of the current mobile phone verification method and the way it does not meet the people\\'s demand on security and usability.Verification techniques mentioned in this article for the mobile phone industry and not a new verification method, but a comprehensive analysis of all current methods of verification of a conclusion: when the validation and on which application for verification.This is the significance of this paper, I hope you can have a good guide for mobile phone authentication technology.In order to ensure the safety based on, as far as poible to make it easier for users to use.This is not only mobile phone industry in the future direction of development, should also be the development trend of all other industries, could therefore be the corresponding reference to the ideas and theories.Two, multilayer verification In this paper, the concept of multi tier verification is mentioned, that is, to provide different authentication level for different mobile applications.For example: for applications such as games and weather can be open to everyone, as long as you get the phone can open these applications, not on the phone owner caused economic loes; for text meages, phone, mail, etc.These involves the application of personal privacy, should be set as part of the validation for private, when need to use and need, and for bank accounts and relates to the application of security and property, should give the utmost confidentiality permiions.For different authentication levels, each user\\'s permiion to use the phone is not the same.When the mobile phone owner is trusted by the system, it is easy to use all or most of the mobile phone applications in the system.For the first time using a cell phone, the system can not identify their credibility, so only use public mobile application, if you want to open a private or confidential application, you need to other verification methods.On the basis of the security of the proposed scheme, it can greatly facilitate the user\\'s operation, has gone beyond the original "All-or-nothing" verification method.Three, the results of the experiment In this paper, the corresponding experiments are carried out.The basic principle of the experiment is to install a variety of types of sensors on the phone, used to collect a variety of data trusted users.For example: the temperature sensor can collect the user\\'s temperature; the sound sensor can be used to collect the user\\'s voice gradually when the user calls, the video sensor can collect the user\\'s physiological characteristics and so on.In addition, the paper also mentions a new type of verification, which is the verification of equipment.In the user\\'s multiple electronic devices (such as PC, Pad and mobile phones) in the establishment of a Bluetooth connection, when the phone is in use, you can automatically detect the presence of these are connected to the surrounding equipment.If the system finds that it is unable to connect to other devices, it will improve the security level of the phone, users need to use mobile applications involving privacy, you will need more authentication.The goal of the experiment is the following four points: 1, reduce the verification cost 2, find the security and convenience of the compromise 3, the security of the model to the level of different reasoning logic 4, little energy consumption.In terms of safety and convenience, the article referred to the FR (Rejection False) and FA (Authentication False) two concepts, that is, the probability of Statistics "abandon true" and "false"".FR indicates that a legitimate user is not required to verify the identity of the probability, while FA indicates that an illegal user does not have the probability of being verified.In the experiment, the author defines a variable R, when R is higher, indicating that the user needs more high convenience, this will also lead to more FA; when R is low, indicating that users need higher security, which will lead to more fr.The experiment proves that the verification technology can meet the needs of users\\' safety and convenience.For the high level of bank accounts and security requirements of application, ratio of FA always 0 that will never come illegal users not validated using these applications; and fr ratio has been in more than 96%, namely for a legitimate user, with the increase of R, the wrong of the requirements validation probability did not significantly reduced.
- 神兽|中国十大传统神兽,中国神兽有哪些
- 《自卑与超越》读后感锦集
- 三金|三金算彩礼还是算赠与
- 人与人最舒服的关系:降低期待
- 人与人之间最大的差距:思维模式
- 筐出未来-过去与现在
- 《重写晚明史:朝廷与党争》的读后感大全
- 美丽心灵
- 孔子与论语读后感100字
- 《弗洛伊德的躺椅与尼采的天空》读后感精选