Mouse behavior characteristic-based password authentication method
A password authentication, mouse technology, applied in the field of security authentication, to achieve the effect of improving reliability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0036] Below in conjunction with accompanying drawing, the technical scheme of invention is described in detail:
[0037] Such as figure 1 The shown password authentication method based on mouse behavior characteristics comprises the following steps:
[0038] Step 1, collect the time parameters of each mouse event, and obtain the average value of the time parameters,
[0039] The time parameters include: left-click mouse duration, right-click mouse duration, two keystroke time intervals;
[0040] Step 2, according to the outline of the trajectory of the mouse when the mouse event occurs, obtain the identification graphic and generate the graphic password, which specifically includes the following steps:
[0041] Step 2-1, such as figure 2 As shown, the maximum and minimum coordinates of the recognition figure in the vertical and horizontal directions are respectively obtained in the specific rectangular window, and the rectangular area to which the recognition figure belon...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 