Method for realizing identity discrimination of operating users through recognizing keyboard/mouse input habits of operating users
A technology for manipulating users and key operations, applied in the computer field
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0026] Key input principle In the single-chip microcomputer application system, except the reset button has a special reset circuit and a dedicated reset function, other buttons are set to control functions or input data in the switch state. When the set function key or number key is pressed, the computer application system should complete the function set by the key. For a group of keys or a keyboard, there is always an interface circuit connected to the CPU. The CPU can use the query or interrupt method to know whether there is a key input and check which key is pressed, send the key number to the accumulator ACC, and then transfer to the function program that executes the key through the jump instruction, and then Return to the main program.
[0027] The method for identifying the operating user's identity through keyboard and mouse input habit recognition is performed according to the following steps:
[0028] (1) Define input habits:
[0029] Keystroke pressure: detect...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com