Method for judging identity based on keyboard-mouse crossed certification

A technology of cross-certification and judgment method, applied in the fields of digital data certification, instruments, electronic digital data processing, etc., can solve problems such as misjudgment of legal user identity, improve fault tolerance, reduce uncertainty, widen security and applicability sexual effect

Inactive Publication Date: 2010-09-15
XI AN JIAOTONG UNIV
View PDF2 Cites 71 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The method monitors and authenticates the user's identity based on computer operation behavior (keystroke and mouse behavior), and uses the cross-certification method to organically combine the keystroke behavior a

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for judging identity based on keyboard-mouse crossed certification
  • Method for judging identity based on keyboard-mouse crossed certification
  • Method for judging identity based on keyboard-mouse crossed certification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The present invention will be further described in detail below with reference to the accompanying drawings and examples of implementations.

[0023] system structure

[0024] see figure 1 , the present invention monitors the user identity based on the computer operation behavior (keystroke and mouse behavior), and combines the keystroke behavior authentication with the mouse behavior authentication by using the cross-certification method. In the process of identity login for computer users, keystroke behavior authentication or mouse behavior authentication is randomly selected as the preferred mechanism or alternative mechanism for identity authentication. When the preferred identity authentication mechanism is successfully authenticated, the user passes identity authentication; When the mechanism authentication fails, the alternative authentication mechanism is used to re-authenticate the user's identity. If the authentication succeeds, the user passes the identity a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for judging an identity based on keyboard-mouse crossed certification, which organically combines keystroke behavior certification and mouse behavior certification together and comprises the following steps: selecting the keystroke behavior certification or the mouse behavior certification as a preferred mechanism or an alternative mechanism for identity certification at random in the process of registering an identity by a user; allowing the user to pass the certification when the preferred identity certification mechanism certification is successful; using the alternative certification mechanism to perform identity certification again when the preferred identity certification mechanism certification is failed; adopting the mouse behavior certification to perform identity certification again when detecting that the keystoke behavior of the user is abnormal in the process of identity monitoring of the user; and adopting the keystroke behavior certification to perform identity certification again when detecting that the mouse behavior of the user is abnormal. The invention utilizes the advantages and suitable fields of two biological behavior characteristics identifications to improve fault tolerance, overcome incompleteness of single biological behavior characteristic information and broaden safety and applicability thereof.

Description

technical field [0001] The invention relates to an identity determination method in the fields of biometric identification and information system security, in particular to an identity determination method based on keyboard and mouse cross authentication. Background technique [0002] In the field of biometric identification and information system security, identity authentication based on biometric behavior has become a very important and cutting-edge research topic. The information system establishes a legal correspondence between system users and system accounts through technical means such as identity authentication or identity monitoring, which is a prerequisite for subsequent security management measures such as authority control and behavior audit. There are currently three main types of basis for determining user identity: 1. What you know, such as passwords, PINs, etc.; 2. What you have, such as ID cards (identity cards), tokens, etc.; 3. You yourself, such as finge...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/00G06F21/44
Inventor 蔡忠闽沈超管晓宏蔡金培
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products