Method for realizing identity discrimination of operating users through recognizing keyboard/mouse input habits of operating users

A technology for manipulating users and key operations, applied in the computer field

Inactive Publication Date: 2011-09-14
DATCENT TECH
View PDF2 Cites 35 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the existing technology, the general identification system only authenticates the user name and password, and there is almost no control behind it. If it can effectively identify the user's operating habits, it will be an innovation in the field of security verification.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0026] Key input principle In the single-chip microcomputer application system, except the reset button has a special reset circuit and a dedicated reset function, other buttons are set to control functions or input data in the switch state. When the set function key or number key is pressed, the computer application system should complete the function set by the key. For a group of keys or a keyboard, there is always an interface circuit connected to the CPU. The CPU can use the query or interrupt method to know whether there is a key input and check which key is pressed, send the key number to the accumulator ACC, and then transfer to the function program that executes the key through the jump instruction, and then Return to the main program.

[0027] The method for identifying the operating user's identity through keyboard and mouse input habit recognition is performed according to the following steps:

[0028] (1) Define input habits:

[0029] Keystroke pressure: detect...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the field of computers, and discloses a method for realizing the identity discrimination of operating users through recognizing the keyboard/mouse input habits of the operating users. The method comprises the following steps: defining the input habits such as keystroke pressures, pressing intervals, loosening intervals, associated intervals and combined intervals; when carrying out single-key mapping input through a keyboard, inputting word groups through a keyboard, inputting function keys through a keyboard, inputting combination keys through a keyboard, and carrying out mouse keypad entry and mouse pulley key input, and recording related inputs so as to form a quantitative data storage-recognition data model; and because a difference with a certain rule exists between the recognition data models formed by operating the keyboard and the mouse by each user, when the users carry out input operation, recognizing different users through comparing the input information with the recognition data models. By using the method disclosed by the invention, the effective identity discrimination on the operating users can be realized through recognizing the keyboard/mouse input habits of the operating user; and through carrying out quantization processing on the slight differences of input habits, the recognition level as that of fingerprint recognition can be achieved.

Description

technical field [0001] The invention belongs to the field of computers, and relates to a method for discriminating user identities, in particular to a method for discriminating operating user identities through keyboard and mouse input habit recognition. Background technique [0002] Recently, a study from the UK showed that, first of all, your keyboard can identify you. When a person is typing on the keyboard, the unique rhythm has an identification function no less than that of fingerprints and pupils. Second, your keyboard knows you, including your state and mood. The pressure in the heart often turns into the pressure on the fingertips. The keyboard is not only the bearer of this pressure, but also the recorder of this pressure. The keyboard can accurately identify the level of tension the person typing it is experiencing. In the prior art, the general identification system only authenticates the user name and password, and there is almost no control behind it. If the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F3/02G06F3/033G06F21/32
Inventor 葛志元李曙强
Owner DATCENT TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products