Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Keystroke-based identity authentication method and system

An identity authentication and keystroke technology, applied in the Internet field, can solve the problems of excessive collection, inability to confirm the legitimacy of user identities, and high cost, so as to improve the responsiveness and ensure the accuracy of authentication.

Active Publication Date: 2018-07-06
TONGJI UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In view of the shortcomings of the prior art described above, the purpose of the present invention is to provide an identity authentication method and system based on keystroke behavior, which is used to solve the problem of excessive collection, high cost, and inability to real-time user authentication in the prior art. The problem of confirming the legality of identity

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Keystroke-based identity authentication method and system
  • Keystroke-based identity authentication method and system
  • Keystroke-based identity authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] Embodiments of the present invention are described below through specific examples, and those skilled in the art can easily understand other advantages and effects of the present invention from the content disclosed in this specification. The present invention can also be implemented or applied through other different specific implementation modes, and various modifications or changes can be made to the details in this specification based on different viewpoints and applications without departing from the spirit of the present invention.

[0049] see Figure 1 to Figure 4 . It should be noted that the diagrams provided in this embodiment are only schematically illustrating the basic idea of ​​the present invention, and only the components related to the present invention are shown in the diagrams rather than the number, shape and shape of the components in actual implementation. Dimensional drawing, the type, quantity and proportion of each component can be changed arb...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides an identity authentication method based on the keystroke behavior, comprising the following steps: S1, constructing a user model of the keystroke characteristics of the legal user according to the legal keystroke behavior during the training of the legal user; The estimated keystroke behavior generates an estimated keystroke time sequence; S3, generates an estimated extremely adjacent character sequence according to the estimated keystroke time sequence; S4, combines the estimated extremely adjacent character sequence with the user model Carry out a match, and judge whether the keystroke behavior to be estimated of the logged-in user is legal according to the matching result; keystroke behavior and update the user model. Only a small number of representative keystroke features of the user are extracted, which improves the responsiveness of continuous authentication while ensuring the accuracy of authentication; monitors the user's keystroke behavior in real time to provide users with continuous account security.

Description

technical field [0001] The invention relates to the Internet field, in particular to an identity authentication method and system based on keystroke behavior. Background technique [0002] With the rapid development of the Internet, users have higher requirements on the security of accounts in the Internet. The most common method by far is authentication based on a text-matching combination of username and password. Although this method is simple and easy to implement, once the password is leaked, this identity authentication method will become invalid. Since everyone's behavior has its own biological characteristics, and the user's keystroke behavior is related to the user's age, gender, and familiarity with computer keyboards, the keystroke behavior patterns of different users are difficult to be imitated and embezzled by others of. Moreover, the authentication method based on the keystroke behavior does not require additional hardware support, the cost is low, and the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06F21/31
CPCG06F21/316H04L63/0815H04L63/0853H04L63/0861H04L9/40
Inventor 蒋昌俊闫春钢陈闳中丁志军宋小双
Owner TONGJI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products