Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Persistent identity authentication method and system based on different contexts

An identity authentication and context technology, applied in the field of continuous identity authentication methods and systems, can solve problems such as the inability to effectively verify the current user, and achieve the effect of ensuring authentication accuracy and improving responsiveness.

Active Publication Date: 2020-11-10
CHONGQING UNIV OF POSTS & TELECOMM
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, users will have different daily behaviors and biological behaviors when using the system at work, at home, or on business trips. For these different contexts, traditional continuous identity authentication methods cannot effectively verify current users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Persistent identity authentication method and system based on different contexts
  • Persistent identity authentication method and system based on different contexts
  • Persistent identity authentication method and system based on different contexts

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0042] Judging whether the current user is a new user according to the user login information, first judge whether the current user is a new user, if it is a new user, construct a user model of a legal user based on legal context information, keystroke behavior and mouse behavior, and then construct a legal user's user model User models include:

[0043] Read the standardized feature vector corresponding to the user ID in the database, and construct a label for the user according to the standardized feature vector; use the user label attribute and user ID to construct three training sets: the training set of the user's keystroke behavior characteristics, and the user's mouse behavior characteristics. The training set and the feature-level fusion training set of user keystrokes and mouse behavior features; use the training set of user keystroke behavior features, the training set of user mouse behavior features, the training set of user feature-level fusion and user context info...

Embodiment 2

[0054] Such as figure 1 , the identity authentication system used in the present invention includes a user's PC device and a server.

[0055] The user's PC device includes: a registration module, a context information collection module, a behavior collection module, a feature extraction module, a matching module, a user requirement module, an authentication module and a dynamic update module.

[0056] Registration module: determine whether the current user is a new user;

[0057] Context information collection module: collect the context information of user login, and calculate the threshold U of different context environments;

[0058] Behavior collection module: collect keystroke and mouse behavior characteristics of users in the system;

[0059] Feature extraction module: convert the user's keystroke and mouse behavior features into behavior vectors;

[0060] Matching module: match whether the user behavior feature vector is the current user, and calculate the credibilit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of biological authentication, and particularly relates to a continuous identity authentication method and system based on different context environments, and the method comprises the steps: setting a threshold value according to context information when a user logs in; Collecting mouse behaviors and keystroke behaviors of the user after logging in; Extracting a feature vector of a biological behavior of the user according to a request adjustment threshold value of the user for different functional modules after logging in the system; Calculating thetrust degree of the current user, comparing the trust degree of the current user with a threshold value, and if the trust degree is greater than the threshold value, storing context information and biological behavior characteristics of the current user and updating the current user model; According to the method, a large amount of redundant mouse features are removed in a user keystroke behaviorfeature extraction mode in different context environments, so that the current user can be accurately authenticated when only a small amount of behavior data exists, and the response capability of continuous authentication is improved; And designing a calculation method of the adaptive threshold U according to the context information of the user.

Description

technical field [0001] The invention belongs to the technical field of biological authentication, in particular to a continuous identity authentication method and system based on different context environments. Background technique [0002] The popularity of computers has penetrated into all aspects of our daily life, entertainment and work. It not only brings a lot of convenience to our life, but also each system contains a variety of information, including the user's private information and work information. Information, also includes internal information of a company or enterprise. However, for most existing computer systems, when a user logs in to the system through authentication, resources in the system are available to the user until the user logs out of the system. Once an attacker breaks through the user's static authentication or the user leaves the system unattended after logging in, it will easily lead to system resource leakage and cause very serious consequenc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/31
Inventor 陈龙钟意
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products