Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Method of Identity Authentication Based on User's Mouse Behavior

An identity authentication and behavior technology, applied in the field of identity authentication based on user mouse behavior, can solve the problems of complex process, inability to apply authentication technology, and high hardware cost

Active Publication Date: 2016-05-11
NORTHEASTERN UNIV LIAONING
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] For biometric authentication technologies based on physical features, the implementation process of these solutions is relatively complicated, and most of them require some complex and expensive hardware devices, such as fingerprint readers, etc., and the hardware cost is relatively high
At the same time, most of these authentication technologies cannot be applied in the Internet environment.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Method of Identity Authentication Based on User's Mouse Behavior
  • A Method of Identity Authentication Based on User's Mouse Behavior
  • A Method of Identity Authentication Based on User's Mouse Behavior

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0070] An embodiment of the present invention will be further described below in conjunction with the accompanying drawings.

[0071] Identity authentication based on mouse behavior is a kind of biometric authentication, which conforms to the general process of biometric authentication, such as figure 1 As shown, the identity authentication scheme based on mouse behavior mainly includes four processes, mouse behavior preprocessing, mouse behavior feature value extraction, classification model construction, and classification decision-making.

[0072] (1) The mouse behavior preprocessing process includes the collection of basic mouse events and the combination of mouse behavior. In order to effectively describe the mouse behavior, this work divides the mouse behavior into layers. The low-level mouse behavior is composed of the directly available basic mouse events, and the high-level mouse behavior is composed of low-level mouse behaviors according to certain rules.

[0073] (...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention is an identity authentication method based on the user's mouse behavior, which belongs to the technical field of biometric authentication. The mouse behavior of the present invention is generated by the user operating a human-computer interaction device. This device is different from the complex and expensive ones used in the prior art. The hardware device only uses computers, so it has the advantage of low cost; in addition, whether in training collection or monitoring mode, the mouse behavior is acquired during the user's daily operation, does not affect the user's normal use, and has the characteristics of no interference; use As a feature, mouse behavior is easier for people to accept than using our physiological characteristics, and there is no resistance; identity authentication based on mouse behavior characteristics is more suitable for the current operating environment, and the opportunity to use the mouse is much greater than other human-computer interaction devices. ;At the same time, since the use of the mouse runs through the entire operation process, the user's behavior can be continuously authenticated.

Description

technical field [0001] The invention belongs to the technical field of biological authentication, and in particular relates to an identity authentication method based on user's mouse behavior. Background technique [0002] With the development of computer and network technology, traditional identity authentication schemes can no longer meet the security requirements for identity authentication in the current network environment. The traditional authentication schemes mainly refer to the user name password mechanism and the token holding mechanism to authenticate the identity of the visitor. Both of these two traditional authentication schemes have many security problems. For the username and password scheme, the password is easily leaked, lost, and cracked. At the same time, this scheme cannot ensure the uniqueness of the user's identity, that is, anyone who can obtain the username and password can use the identity of the user on the network. Log in and access the resources...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/32
CPCG06F21/316
Inventor 徐剑周福才李明洁秦诗悦
Owner NORTHEASTERN UNIV LIAONING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products