Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity recognition method based on user keystroke characteristic

An identification and keystroke technology, applied in the field of computer information security, can solve the problems of poor ease of use, complex identification technology deployment, high cost, high application and promotion value, high pass rate of legal users and high rejection rate of illegal users , Simple and effective effect of identification method

Active Publication Date: 2010-03-17
北京微通新成网络科技有限公司
View PDF0 Cites 41 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide an identity recognition method based on user keystroke features, aiming to solve the problems of complex deployment, high cost and poor usability of existing identity recognition technologies. Factor Strong Identity

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity recognition method based on user keystroke characteristic
  • Identity recognition method based on user keystroke characteristic
  • Identity recognition method based on user keystroke characteristic

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0063] Applying an identity recognition method based on user keystroke features provided by the present invention, when registering a user, the specific flow of the recognition method is as follows: Figure 4 As shown, the steps are as follows:

[0064] Step 1. The user first enters a user name that meets the rules; then the user will enter the password multiple times according to the system requirements, for example, enter the password password 3 to 8 times;

[0065] Step 2, collect keystroke characteristic information of the user.

[0066] For the keystroke event when the user enters the user name and password, collect the user's dwell time T on each key 1 and the interval time T between adjacent keys 2 , as well as the keystroke strength and keystroke feature information meet the system requirements, the system will collect the user’s keystroke features according to a certain data format; For input, the dwell time T collected on each key 1 , the interval time between ad...

Embodiment 2

[0072] Applying the identification method based on the user's keystroke features provided by the present invention, the flow chart for user login identification is as follows: Figure 5 As shown, the specific steps are:

[0073] Step 1. The user accesses the system and performs user login;

[0074] Step 2. The system requires the user to enter the registered user name;

[0075] Step 3: The user enters the password used for registration;

[0076] Step 4. The system first verifies whether the user's password is correct. If the password is wrong, return to step 3 to re-enter the password; if the password is correct, the system continues to verify whether the user's keystroke characteristics are correct.

[0077] Step 5, the system collects the keystroke characteristic information of the user while the user inputs the user name and password, and matches the keystroke characteristic information with the identification data stored in the identification database module in the serve...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity recognition method based on a user keystroke characteristic, comprising the following steps: acquiring the user keystroke characteristic information to carry out filtering treatment; tracking the acquisition process of the step 1 by a driving security protection technology and securely processing acquired the keystroke characteristic information; using an SSL and identity mutual authentication technology to transmit the keystroke characteristic information acquired in the step 1; carrying out data pretreatment on the keystroke characteristic information; adopting an algorithm for supporting the improvement of a vector machine to calculate a sample mean value of the keystroke characteristic information data, and removing the noise in a sample; taking thesample mean value after being carried out statistics and pretreatment as a new sample and calculating and outputting identity recognition data; and securely storing the obtained identity recognition data to an identity recognition database. The identity recognition method is simple and effective, easily integrates with the original system, has very high pass rate of valid users and rejection rateof invalid users, can supply and replace the existing other identity recognition technologies and has very high application and promotion values.

Description

technical field [0001] The invention belongs to the field of computer information security and provides an identification method based on keystroke features of users. Background technique [0002] In the current identification technology field, two types of technologies are relatively mature: one is token technology based on smart card, USBKey or dynamic password (OTP), and the other is biometric technology. [0003] Token technology is a combination of specific software or hardware and traditional user name and password to form a two-factor identification system, which can improve the security of identification. Although the application is relatively mature, it has high cost and deployment. Difficulty, users are not easy to use and other issues, in some application fields that require low cost and moderate security requirements, it is difficult to promote. [0004] Biometrics technology is a combination of high-tech means such as computer and optics, acoustics, biosensors ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32
Inventor 赵建傅念东石继东侯俊伟
Owner 北京微通新成网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products