A Method of Identity Authentication Based on User's Mouse Behavior
An identity authentication and behavior technology, applied in the field of identity authentication based on user mouse behavior, can solve the problems of complex process, inability to apply authentication technology, and high hardware cost
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0070] An embodiment of the present invention will be further described below in conjunction with the accompanying drawings.
[0071] Identity authentication based on mouse behavior is a kind of biometric authentication, which conforms to the general process of biometric authentication, such as figure 1 As shown, the identity authentication scheme based on mouse behavior mainly includes four processes, mouse behavior preprocessing, mouse behavior feature value extraction, classification model construction, and classification decision-making.
[0072] (1) The mouse behavior preprocessing process includes the collection of basic mouse events and the combination of mouse behavior. In order to effectively describe the mouse behavior, this work divides the mouse behavior into layers. The low-level mouse behavior is composed of the directly available basic mouse events, and the high-level mouse behavior is composed of low-level mouse behaviors according to certain rules.
[0073] (...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com