“…Implicit authentication systems have been proposed based on many different features. These include systems that authenticate the user based on biometrics [36,40,42,50], accelerometers [11], gait recognition [33,23,20], call and SMS pattern [51], location pattern [10,52,9,12,53], keystroke dynamics [14,28,60,38,19,58], proximity to other devices [32,48], and touchscreen dynamics [57,16,21]. Industry products such as Sentry from AdmitOne Security 2 and BehavioMobile from BehavioSec 3 implement implicit authentication.…”