Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity authentication method based on multi-behavior feature selection

A feature selection and identity authentication technology, applied in the field of information security, can solve the problems of legal users being wrongly judged as illegal users, poor identity authentication performance, poor classifier performance, etc., to achieve wide security and applicability, high accuracy, The effect of high hardware equipment

Inactive Publication Date: 2019-09-27
GUIZHOU UNIV +1
View PDF9 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Unless the intruder can perfectly imitate the behavior of the owner, but this is almost impossible
[0008] However, due to certain fluctuations in behavioral characteristics, some behavioral characteristics are redundant, resulting in poor performance of the classifier, so that the identity determination method based on all behavioral characteristics will cause misjudgment, and the performance of identity authentication is poor, and it is easy to misjudge legitimate users. for illegal users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method based on multi-behavior feature selection
  • Identity authentication method based on multi-behavior feature selection
  • Identity authentication method based on multi-behavior feature selection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0026] An identity authentication method and technical process based on multi-behavior feature selection are as follows: figure 1 As shown, the whole process includes three sub-processes: user registration, user authentication, and data retraining. In the user registration stage, the user operates the keyboard and mouse according to the prompt operation of the small game designed by the system. This process mainly extracts the user's keyboard behavior and mouse behavior, and the physical address and IP address of the device information are obtained through some software. As for some habits of the user The behavior does not exist during the registration phase, but is obtained after logging in to the system for a period of time. This process of collecting data is hidden from the user. After collecting the behavioral data, preprocess the data to get rid ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity authentication method based on multi-behavior feature selection, which utilizes multiple behavior features (keystroke, mouse, equipment information, IP) to perform identity authentication, selects appropriate features and sub-features, and solves the problem of legal user identity misjudgment when the identity is judged based on all behavior features. The method is simple to implement, improves the fault tolerance, reduces the uncertainty, has the advantages of high safety, no need of complex hardware equipment, high accuracy and the like, overcomes the redundancy of all behavior characteristics, and has wider safety and applicability by using the advantages of behavior characteristic recognition and application fields.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to an identity authentication method based on multi-behavior feature selection. Background technique [0002] Computer systems and computer networks are a virtual digital world. In this digital world, all information, including the user's identity information, is represented by a specific set of data. Computers can only identify the user's digital identity, and all authorizations to users are also authorizations for the user's digital identity. The real world we live in is a real physical world, and everyone has a unique physical identity. How to ensure that the operator who operates with a digital identity is the legal owner of this digital identity, that is to say, to ensure that the physical identity of the operator corresponds to the digital identity, has become a very important issue. In the real world, a person's identity is mainly judged in three ways. One is t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06K9/62
CPCG06F21/316G06F18/2411
Inventor 丁兴彭长根丁红发牟其林杨辉
Owner GUIZHOU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products