Identity authentication method based on mouse behaviors of user

A technology of identity authentication and behavior, which is applied in the field of identity authentication based on user mouse behavior, and can solve the problems of inapplicable authentication technology, high hardware cost, complicated process, etc.

Active Publication Date: 2014-01-22
NORTHEASTERN UNIV
View PDF3 Cites 34 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] For biometric authentication technologies based on physical features, the implementation process of these solutions is relatively complicated, and most of them require some complex and expensiv

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method based on mouse behaviors of user
  • Identity authentication method based on mouse behaviors of user
  • Identity authentication method based on mouse behaviors of user

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0070] An embodiment of the present invention will be further described below in conjunction with the accompanying drawings.

[0071] Identity authentication based on mouse behavior is a kind of biometric authentication, which conforms to the general process of biometric authentication, such as figure 1 As shown, the identity authentication scheme based on mouse behavior mainly includes four processes, mouse behavior preprocessing, mouse behavior feature value extraction, classification model construction, and classification decision-making.

[0072] (1) The mouse behavior preprocessing process includes the collection of basic mouse events and the combination of mouse behavior. In order to effectively describe the mouse behavior, this work divides the mouse behavior into layers. The low-level mouse behavior is composed of the directly available basic mouse events, and the high-level mouse behavior is composed of low-level mouse behaviors according to certain rules.

[0073] (...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an identity authentication method based on mouse behaviors of a user, and belongs to the technical field of biometric authentication. The user operates a human interface device to obtain the mouse behaviors, the device is different from hardware equipment used in the prior art, the hardware equipment is complex and expensive, only one computer is used, and therefore the identity authentication method has the advantages of being low in cost. In addition, in a training collection mode and a monitoring mode, the mouse behaviors are obtained in daily operation of the user, normal use of the user is not affected, and the identity authentication method has the advantages of being free of interference. The mouse behaviors serve as features, the features can be accepted by people more easily compared with physiological features of the people, and no resisting mentality is produced. The identity authentication method based on the mouse behaviors is more suitable for an existing operation environment, and mouse using opportunities are much larger than those of other human interface devices. Meanwhile, as a mouse is used in the whole operation process, continuous authentication can be conducted on the behaviors of the user.

Description

technical field [0001] The invention belongs to the technical field of biological authentication, and in particular relates to an identity authentication method based on user's mouse behavior. Background technique [0002] With the development of computer and network technology, traditional identity authentication schemes can no longer meet the security requirements for identity authentication in the current network environment. The traditional authentication schemes mainly refer to the user name password mechanism and the token holding mechanism to authenticate the identity of the visitor. Both of these two traditional authentication schemes have many security problems. For the username and password scheme, the password is easily leaked, lost, and cracked. At the same time, this scheme cannot ensure the uniqueness of the user's identity, that is, anyone who can obtain the username and password can use the identity of the user on the network. Log in and access the resources...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/32
CPCG06F21/316
Inventor 徐剑周福才李明洁秦诗悦
Owner NORTHEASTERN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products