Method for identity identification according to characteristics of user keystroke
An identity authentication and user technology, applied in user identity/authority verification, electrical components, transmission systems, etc., to achieve the effect of reducing the possibility and improving system security
Inactive Publication Date: 2009-10-14
冀连有 +1
0 Cites 28 Cited by
AI-Extracted Technical Summary
Problems solved by technology
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View moreMethod used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View moreAbstract
The invention relates to a method for identity identification of a user of a computer and other terminal devices, in particular to a method for identity identification of users in the network world in the inputting process through a keyboard. The method is characterized in that a method for identification according to the characteristics of a user keystroke is added on the basis of a traditional username/password pair identification mechanism. Due to the adoption of the method, the safety of the system can be enhanced, and the disabled users are prevented from logging in by the identity of a validated user to access the resources in the system; and even if the disabled user knows the username/password pairs of the validated user, since the keystroke characteristic of the validated user is generally different from that of the user corresponding to the username/password pairs, the authentication is not available, therefore, the provided identification method has higher security.
Application Domain
Technology Topic
Image
Examples
- Experimental program(1)
Example Embodiment
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more PUM


Description & Claims & Application Information
We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more Similar technology patents
Cage nut assembly having stand-offs
Owner:ACUMENT INTPROP LLC
Method of Attaching Radiopaque Markers to Intraluminal Medical Devices, and Devices Formed Using the Same
Owner:BOSTON SCI SCIMED INC
Patello-femoral joint arthroplasty
InactiveUS20050143833A1Reduce the possibilityJoint implantsAcyltransferasesEdge surfaceBearing surface
Owner:DEPUY PROD INC
Boom stand
ActiveUS7207532B1Gradual and predictable variationReduce the possibilityPipe supportsStands/trestlesEngineeringCantilever
Owner:ROBERTS JEFFREY A +2
System and method for faucet installations
ActiveUS8272083B1Reduce the possibilityPossibility of leakageNutsDomestic plumbingValve stemEngineering
Owner:LISTON THOMAS D
Classification and recommendation of technical efficacy words
- Reduce the possibility
- Improve system security
System and method of providing tokenization as a service
ActiveUS20130198080A1Reduce the possibilityReduce riskFinanceDebit schemesService systemService provision
Owner:VISA INT SERVICE ASSOC
Cas9-foki fusion proteins and uses thereof
ActiveUS20150071899A1Strong specificityReduce the possibilityFusion with DNA-binding domainPeptide/protein ingredientsResearch settingNuclease
Owner:PRESIDENT & FELLOWS OF HARVARD COLLEGE
Composite facer for wallboards
InactiveUS20020151240A1Easy to foldReduce the possibilityMedical devicesPressure infusionSecondary layerPolyester
Owner:MILLIKEN & CO
Prosthetic heart valves
InactiveUS20080082163A1Reduce the possibilityGood blood compatibilityHeart valvesProsthesisBiomedical engineering
Owner:ST JUDE MEDICAL LLC
Method of CABAC Significance MAP Decoding Suitable for Use on VLIW Data Processors
ActiveUS20080267513A1Favorable decodingReduce the possibilityCode conversionCharacter and pattern recognitionSymbol decodingParallel computing
Owner:TEXAS INSTR INC