Unlock instant, AI-driven research and patent intelligence for your innovation.

Mouse behavior characteristic-based password authentication method

A password authentication, mouse technology, applied in the field of security authentication, to achieve the effect of improving reliability

Inactive Publication Date: 2015-01-07
ZHENJIANG GOLDNT SOFTWARE CORP
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the strength of such authentication methods is two-fold, the cracking methods do add up

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mouse behavior characteristic-based password authentication method
  • Mouse behavior characteristic-based password authentication method
  • Mouse behavior characteristic-based password authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] Below in conjunction with accompanying drawing, the technical scheme of invention is described in detail:

[0037] Such as figure 1 The shown password authentication method based on mouse behavior characteristics comprises the following steps:

[0038] Step 1, collect the time parameters of each mouse event, and obtain the average value of the time parameters,

[0039] The time parameters include: left-click mouse duration, right-click mouse duration, two keystroke time intervals;

[0040] Step 2, according to the outline of the trajectory of the mouse when the mouse event occurs, obtain the identification graphic and generate the graphic password, which specifically includes the following steps:

[0041] Step 2-1, such as figure 2 As shown, the maximum and minimum coordinates of the recognition figure in the vertical and horizontal directions are respectively obtained in the specific rectangular window, and the rectangular area to which the recognition figure belon...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a mouse behavior characteristic-based password authentication method. The method comprises the following steps of: acquiring time parameters of a mouse event, and setting a graphical password by a graphical aggregation domain slicing authentication method; starting authentication when the parameters of the mouse event is in an error range and a mouse clicking region is in an error range of the graphical password after a user inputs the graphical password; and cleaning input vectors and input vector error values, and passing the authentication when a modification function error weight is reached. According to the method, more precise graphic passwords can be acquired by recursively segmenting a mouse behavior region; and the reliability of password authentication is improved by combining the parameters of the mouse event with the precise graphic passwords.

Description

technical field [0001] The invention relates to a password authentication method based on mouse behavior characteristics, and belongs to the technical field of security authentication. Background technique [0002] With the development of science and technology, security certification methods are increasingly diversified. Password authentication and PIN code identify the user identity by entering a user-defined password when logging in to the network; the smart card stores the relevant data of the user identity on the integrated chip, and the user can obtain the user identity information after inserting the smart card into the card reader; fingerprint Biological features such as iris and iris are unique and can effectively identify users. However, there are still many defects in the existing identity authentication technology. [0003] Because passwords are easy to leak; passwords stored in computers are easily attacked by Trojan horse programs, and passwords are easily in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/36G06F21/83
Inventor 丁力孙知信王志威宫婧
Owner ZHENJIANG GOLDNT SOFTWARE CORP