Method for identity identification according to characteristics of user keystroke

An identity authentication and user technology, applied in user identity/authority verification, electrical components, transmission systems, etc., to achieve the effect of reducing the possibility and improving system security

Inactive Publication Date: 2009-10-14
冀连有 +1
0 Cites 28 Cited by

AI-Extracted Technical Summary

Problems solved by technology

This brings a serious problem - once the attacker obtains the username/password pa...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Method used

[0030] In the specific implementation process, the maximum number of failed logins allowed by the same user within a period of time (such as 24 hours) ...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Abstract

The invention relates to a method for identity identification of a user of a computer and other terminal devices, in particular to a method for identity identification of users in the network world in the inputting process through a keyboard. The method is characterized in that a method for identification according to the characteristics of a user keystroke is added on the basis of a traditional username/password pair identification mechanism. Due to the adoption of the method, the safety of the system can be enhanced, and the disabled users are prevented from logging in by the identity of a validated user to access the resources in the system; and even if the disabled user knows the username/password pairs of the validated user, since the keystroke characteristic of the validated user is generally different from that of the user corresponding to the username/password pairs, the authentication is not available, therefore, the provided identification method has higher security.

Application Domain

Technology Topic

Image

  • Method for identity identification according to characteristics of user keystroke

Examples

  • Experimental program(1)

Example Embodiment

[0024] The method proposed by the present invention is mainly improved and strengthened on the basis of the traditional user name/password pair authentication method. Embodiments of the method proposed by the present invention are described in detail below.
[0025] The implementation of the method proposed by the present invention mainly includes three aspects: keystroke information collection, training stage and authentication stage.
[0026] The keystroke information collection includes not only the keystroke information collection during the training phase when the user inputs several specified texts, but also the keystroke information collection during the authentication phase requiring the user to input the specified text.
[0027] The training phase mainly refers to requiring the user to input the specified text for several times. During this process, the user's keystroke model is established by processing the collected keystroke information. In fact, the keystroke models established for different users are different, so we can authenticate user identity through keystroke characteristics.
[0028] The authentication phase refers to the identity authentication that must be performed when users who pass the training phase need to log in to the system and access resources. Mainly, on the basis of user authentication through the user name/password pair, the user is required to enter the specified text. During this process, the user's keystroke information is collected and compared with the user name in the user name/password established during the training phase. The keystroke models of the corresponding users are compared, and according to whether the keystroke characteristics match, it is determined whether the user is indeed the corresponding user in the username/password.
[0029] If, during the authentication phase, the user is rejected, but the user wants to authenticate again, the authentication process can be repeated, starting by asking him to enter a username/password pair.
[0030] In the specific implementation process, the maximum number of failed logins allowed by the same user within a time period (eg, 24 hours) can be set to limit the user's continuous identity authentication and prevent illegal users from passing the authentication through continuous attempts.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

no PUM

Description & Claims & Application Information

We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Similar technology patents

Boom stand

ActiveUS7207532B1Gradual and predictable variationReduce the possibilityPipe supportsStands/trestlesEngineeringCantilever
Owner:ROBERTS JEFFREY A +2

Classification and recommendation of technical efficacy words

  • Reduce the possibility
  • Improve system security

Cas9-foki fusion proteins and uses thereof

ActiveUS20150071899A1Strong specificityReduce the possibilityFusion with DNA-binding domainPeptide/protein ingredientsResearch settingNuclease
Owner:PRESIDENT & FELLOWS OF HARVARD COLLEGE

Prosthetic heart valves

InactiveUS20080082163A1Reduce the possibilityGood blood compatibilityHeart valvesProsthesisBiomedical engineering
Owner:ST JUDE MEDICAL LLC

People also interested in

Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products