Human behavior analysis and its application to a pervasive computing security system