Three-branch identity authentication method and system based on mouse behaviors

An identity authentication and mouse technology, applied in the field of identity authentication, can solve the problems of wasting time and high authentication time, achieve the desired effect of low false rejection rate and false acceptance rate, and reduce authentication time

Inactive Publication Date: 2019-06-11
CHONGQING UNIV OF POSTS & TELECOMM
View PDF2 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the existing methods, the binary classifier is directly trained, and the mouse user is directly judged as a legal mouse user or an illegal mouse user, which leads to the disadvantage that the existing model of identity authentication needs to correspond to a high authentication time in order to obtain high authentication accuracy.
However, some mouse users can judge the legality of their identity in advance, which will waste a lot of time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Three-branch identity authentication method and system based on mouse behaviors
  • Three-branch identity authentication method and system based on mouse behaviors
  • Three-branch identity authentication method and system based on mouse behaviors

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 2

[0104] This embodiment will further illustrate the application of the three identity authentication models proposed by the present invention in identity authentication;

[0105] The data used in this embodiment is the public data set provided by Balabit as the collected mouse data, and part of the data is shown in Table 1.

[0106] First, data preprocessing is performed on the original data to delete duplicate data, abnormal data, etc.

[0107] According to the mouse behavior and feature calculation method introduced above, the required mouse feature values ​​are calculated and used as model training data. The calculated eigenvalues ​​of the mouse part are shown in Table 3.

[0108] Table 3 Characteristic values ​​of mouse data

[0109]

[0110] In order to avoid errors caused by unbalanced training data, the present invention selects 1000 legal mouse users and 1000 illegal mouse users as training data. Use the random forest algorithm as a classifier for training. And t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the field of identity authentication, and particularly relates to a three-branch identity authentication method and system based on mouse behaviors, and the method comprises the steps: carrying out mouse data collection, and carrying out duplicate removal processing and abnormal removal processing on the collected data; using a data sequence composed of a plurality of basic mouse operations as a mouse behavior, and a feature vector is calculated according to the mouse behavior, so that a related feature value is calculated; Modeling the obtained mouse features to obtain three identity authentication models, outputting probability values of samples belonging to legal mouse users by the models, obtaining threshold values required by classification through a loss function, and dividing sample objects into a positive domain, a boundary domain or a negative domain; and judging the negative domain sample object as an illegal mouse user, judging the positive domain sample object as a legal mouse user, and continuing to authenticate the boundary domain mouse user. According to the method, a decision is made in advance before the number or time of the mice is determined, and higher authentication precision is achieved within lower expected authentication time.

Description

technical field [0001] The invention belongs to the field of identity authentication, and in particular relates to a mouse behavior-based three-way identity authentication method and system. Background technique [0002] Achieving reliable identity authentication is a key issue in protecting the security of applications and services in the network, and the method based on mouse behavior characteristics does not require additional expensive hardware equipment, and only needs the mouse used by the present invention to collect the interactive data when the present invention uses a computer , extract useful features, and use these features to train a classification model to authenticate the legitimacy of the mouse user's identity. Many scholars have proposed an authentication method based on mouse behavior. In the "Identity Authentication Method Based on Mouse Behavior of Mouse Users" proposed by Xu Jian et al., a preliminary method for identifying legitimate mouse users based ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32
Inventor 胡军马康于洪
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products