User authentication method based on keystroke mode identification

A technology of user authentication and pattern recognition, applied in the field of pattern recognition, can solve problems such as hidden dangers of security and easy leakage of passwords, and achieve the effect of improving security performance and good recognition effect.

Inactive Publication Date: 2012-06-06
PLA UNIV OF SCI & TECH
View PDF4 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the biggest disadvantage of this mechanism is that the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User authentication method based on keystroke mode identification
  • User authentication method based on keystroke mode identification
  • User authentication method based on keystroke mode identification

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0017] combine figure 1 , the present invention is based on the user authentication technology of keystroke pattern recognition, and the steps are as follows:

[0018] In the first step, normal users first perform keystroke training.

[0019] (a) extracting the keystroke characteristic features of the user according to the keypress duration and keypress time interval, figure 2 The keystroke characteristic feature extraction method diagram, the keystroke duration reflects the pressure characteristics of the user when the keystroke is pressed, and the keystroke time interval reflects the flexibility of the user to switch between different keys.

[0020] The final keystroke pattern is a vector of length 2n-1 composed of , where n is the password length. Due to the speed of the user's keystrokes, the subsequent keystrokes may be pressed before the previous keystrokes are up, so in this feature, Li, i+1 (i=1...n-1) may be negative value.

[0021] (b) Using a single-class class...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a user authentication method based on keystroke mode identification, which comprises the steps that: firstly, the normal user keystroke training is carried out, the keystroke characteristic feature of users is extracted, and a single classifier is used for training the keystroke mode of the users; the users log in and input passwords, a system obtains the keystroke information of the users, and the information comprises user names, the passwords and the keystroke characteristic feature of the users; the current input passwords and passwords in a user mode base are subjected to password mode matching by an authentication module of an operation system; and finally, the user keystroke information verification is carried out, an interface enters an application system or the operation system if the verification is passed, and the interface returns for logging again if the verification is not passed. The user authentication method has the advantages that the safety performance of the system can be effectively improved, the keystroke behavior of the users is adopted for user authentication, and a certain protection effect can still be ensured after the passwords of the users are stolen.

Description

technical field [0001] The invention belongs to pattern recognition technology, in particular to a user authentication method based on keystroke pattern recognition. Background technique [0002] The research on user authentication technology based on keystroke pattern recognition refers to the password authentication technology that can learn the user's keystroke habits and patterns. The system realizes the distinction between real users and illegal users through different keystroke rhythms and habits of users. [0003] At present, in most software systems and network systems, user name and password authentication is the main way to authenticate users accessing the system. However, the biggest disadvantage of this mechanism is that the password is easy to leak, and there is a serious security risk. Especially when the password is relatively simple, it is easy to crack through dictionary-based brute force; familiar people can even guess the password. According to statistic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06K9/62
Inventor 潘志松陈松灿李佳桢施蕾倪桂强胡谷雨李清
Owner PLA UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products