Method for identity identification according to characteristics of user keystroke

An identity authentication and user technology, applied in user identity/authority verification, electrical components, transmission systems, etc., to achieve the effect of reducing the possibility and improving system security

Inactive Publication Date: 2009-10-14
冀连有 +1
View PDF0 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This brings a serious problem - once the attacker obtains the username/password pa

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for identity identification according to characteristics of user keystroke

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0024] The method proposed by the present invention is mainly improved and strengthened on the basis of the traditional user name / password pair authentication method. Embodiments of the method proposed by the present invention are described in detail below.

[0025] The implementation of the method proposed by the present invention mainly includes three aspects: keystroke information collection, training stage and authentication stage.

[0026] The keystroke information collection includes not only the keystroke information collection during the training phase when the user inputs several specified texts, but also the keystroke information collection during the authentication phase requiring the user to input the specified text.

[0027] The training phase mainly refers to requiring the user to input the specified text for several times. During this process, the user's keystroke model is established by processing the collected keystroke information. In fact, the keystroke mod...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for identity identification of a user of a computer and other terminal devices, in particular to a method for identity identification of users in the network world in the inputting process through a keyboard. The method is characterized in that a method for identification according to the characteristics of a user keystroke is added on the basis of a traditional username/password pair identification mechanism. Due to the adoption of the method, the safety of the system can be enhanced, and the disabled users are prevented from logging in by the identity of a validated user to access the resources in the system; and even if the disabled user knows the username/password pairs of the validated user, since the keystroke characteristic of the validated user is generally different from that of the user corresponding to the username/password pairs, the authentication is not available, therefore, the provided identification method has higher security.

Description

【Technical field】 [0001] The invention relates to a method for authenticating the identity of a user of terminal equipment such as a computer, in particular to a method for verifying the identity of the user when inputting through a keyboard in the network world. 【Background technique】 [0002] The rapid development of Internet technology has changed the way people use computers and made it easier for people to obtain information and resources anytime, anywhere around the world. However, this also greatly increases the opportunities for malicious attacks and intrusions to occur. Therefore, ensuring the reliability of user identities in the network has become an important issue. [0003] Traditionally, user name / password pairs are used to authenticate user identities. After the user passes the authentication stage, the system considers that the user identity is consistent, and rarely uses other mechanisms to continuously confirm the user identity. This brings about a serio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06
Inventor 冀连有冀连权
Owner 冀连有
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products