Continuous authentication method based on biological characteristics and system thereof

A technology of biometric features and authentication methods, applied in the field of identity authentication, can solve problems such as low computer security, achieve the effect of protecting user privacy and data security, achieving security, and ensuring no sensibility

Inactive Publication Date: 2019-06-25
NAT UNIV OF DEFENSE TECH
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The technical problem to be solved by the present invention is to provide a biometric-based continuous authentication method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Continuous authentication method based on biological characteristics and system thereof
  • Continuous authentication method based on biological characteristics and system thereof
  • Continuous authentication method based on biological characteristics and system thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] In order to make the object, technical solution and advantages of the present invention more clear and definite, the present invention will be further described in detail below with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0046] The present invention implements the continuous authentication method based on biological characteristics through the following computer, such as figure 1 As shown, the computer includes: a host (not shown in the figure), a display and a mouse connected to the host, a face collector 20 arranged on the display, and a fingerprint collector 10 arranged on the mouse. Due to the high usage rate of the mouse, usually, when using the calculator, the user holds the mouse in hand most of the time, except of course when typing with both hands. That is to say, when the fingerprint collector...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a continuous authentication method and system based on biological characteristics and a system thereof. The method comprises the following steps: A, fingerprint information ofa user is collected through a fingerprint collector on a mouse every other first preset time; B, when the fingerprint information of the user is not collected, collecting user face information througha face collector at an interval of second preset time; and C, when the collected fingerprint information is invalid fingerprint information or the face information is not collected or the collected face information is invalid face information, locking the computer. Continuous authentication is carried out in a comprehensive authentication mode that fingerprint authentication is mainly carried outand fingerprint authentication and face authentication are combined, the computer is locked after authentication fails, safety can be achieved, and user privacy and data safety are protected.

Description

technical field [0001] The invention relates to the technical field of identity authentication, in particular to a biometric-based continuous authentication method and system thereof. Background technique [0002] In the prior art, most of the current authentication schemes adopt a one-time authentication method, that is, the user identity is not verified after the authentication is successful, which will bring security problems: if the user leaves for a short time, the computer may be used by others and stolen secret. In some occasions with relatively high confidentiality requirements, such as missile launch centers, it is particularly important to protect computer security at any time, and there will be security risks. At the same time, existing authentication technologies often require users to actively authenticate, which is inconvenient during use. Thereby can't provide continuous and convenient security protection for user's use of computer. [0003] Therefore, the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/32G06K9/00G06K9/62
Inventor 冯超李润浩徐学政李佳欣
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products