Identity authentication method and system based on keystroke behaviors

An identity authentication and keystroke technology, applied in the Internet field, can solve the problems of excessive collection, inability to confirm the legitimacy of user identities, and high cost, so as to improve the response ability and ensure the accuracy of authentication.

Active Publication Date: 2016-03-23
TONGJI UNIV
View PDF4 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In view of the shortcomings of the prior art described above, the purpose of the present invention is to provide an identity authentication method and system based on keystroke behavior, which is used to solve the problem of excessive collection, high cost, and inability to real-time user authentication in the prior art. The problem of confirming the legality of identity

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and system based on keystroke behaviors
  • Identity authentication method and system based on keystroke behaviors
  • Identity authentication method and system based on keystroke behaviors

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] Embodiments of the present invention are described below through specific examples, and those skilled in the art can easily understand other advantages and effects of the present invention from the content disclosed in this specification. The present invention can also be implemented or applied through other different specific implementation modes, and various modifications or changes can be made to the details in this specification based on different viewpoints and applications without departing from the spirit of the present invention.

[0049] see Figure 1 to Figure 4 . It should be noted that the diagrams provided in this embodiment are only schematically illustrating the basic idea of ​​the present invention, and only the components related to the present invention are shown in the diagrams rather than the number, shape and shape of the components in actual implementation. Dimensional drawing, the type, quantity and proportion of each component can be changed arb...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an identity authentication method based on keystroke behaviors. The method includes following steps: S1, building a user model of legal user keystroke characteristics according to legal keystroke behaviors during training of legal users; S2, acquiring to-be-estimated keystroke behaviors during keystroke of logged-in users, and generating a to-be-estimated keystroke time sequence; S3, generating a to-be-estimated pole adjacent character sequence according to the to-be-estimated keystroke time sequence; and S4, matching the to-be-estimated pole adjacent character sequence and the user model, and determining whether the to-be-estimated keystroke behaviors of the logged-in users are legal according to a matching result; generating an alarm and enabling the logged-in users to log in again if illegal, and allowing the logged-in users to log in if legal; and storing the to-be-estimated keystroke behaviors and updating the user model. According to the method, a few representative keystroke characteristics of the users are extracted, the authentication accuracy is guaranteed, the response capability of continuous authentication is improved, the keystroke behaviors of the users are monitored in real time, and continuous account safety guarantee is provided for the users.

Description

technical field [0001] The invention relates to the Internet field, in particular to an identity authentication method and system based on keystroke behavior. Background technique [0002] With the rapid development of the Internet, users have higher requirements on the security of accounts in the Internet. The most common method by far is authentication based on a text-matching combination of username and password. Although this method is simple and easy to implement, once the password is leaked, this identity authentication method will become invalid. Since everyone's behavior has its own biological characteristics, and the user's keystroke behavior is related to the user's age, gender, and familiarity with computer keyboards, the keystroke behavior patterns of different users are difficult to be imitated and embezzled by others of. Moreover, the authentication method based on the keystroke behavior does not require additional hardware support, the cost is low, and the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G06F21/31
CPCG06F21/316H04L63/0815H04L63/0853H04L63/0861H04L9/40
Inventor 蒋昌俊闫春钢陈闳中丁志军宋小双
Owner TONGJI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products