Identity recognition method based on keystroke characteristics

A technology of identification and keystroke, which is applied in the field of network security identification, can solve the problems of complex operation, low correct identification rate, and high cost, and achieve the effect of convenient data collection and real-time identification and verification

Inactive Publication Date: 2019-11-12
CHINA CRIMINAL POLICE UNIV
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, in the identity verification system, there are generally problems such as poor data collection efficiency, low correct recognition rate, high cost, and complicated operation.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity recognition method based on keystroke characteristics
  • Identity recognition method based on keystroke characteristics

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] Such as figure 1 As shown, the identification method based on keystroke features includes a keystroke data acquisition module, a training module and a matching module;

[0033] The keystroke data acquisition module mainly completes the collection of keystroke data generated by the user when the user performs a keystroke behavior, and obtains the original data;

[0034] The training module completes the extraction and separation of keystroke feature data; performs keystroke data preprocessing and keystroke feature extraction on the sample keystroke information input by the user from the keyboard, and completes the training and classification of user sample data to generate a feature database; Data preprocessing mainly cleans the user's keystroke feature data; keystroke feature extraction mainly extracts keystroke feature information, key press time, key release time, key bounce time, and keystroke fingerprint features;

[0035] Described matching module finishes discrim...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the field of network security identity recognition methods, and particularly relates to an identity recognition method based on keystroke characteristics, which comprises a keystroke data acquisition module, a training module and a matching module. The keystroke data acquisition module is mainly used for collecting keystroke data generated by a user to obtain original datawhen the user performs a keystroke behavior. The training module is used for completing extraction and separation of keystroke feature data; carrying out keystroke data preprocessing and keystroke feature extraction on sample keystroke information input by a user from a keyboard, and finishing user sample data training classification to generate a feature database. The matching module is used forjudging whether the keystroke characteristics of the user are matched. The method has the advantages of high correct recognition rate, no need of specific physical hardware, hardware installation andpopularization and low cost.

Description

technical field [0001] The invention belongs to the technical field of network security identification, and in particular relates to an identification method based on keystroke features. Background technique [0002] With the rapid development of the Internet, the computer has become an extension of the human brain, and the computer has become the core device of our era, which is needed every moment. As of December 2018, the number of Chinese netizens reached 829 million, with 56.53 million new netizens added throughout the year, and the Internet penetration rate was 59.6%. The Internet has gradually integrated into people's lives and become an indispensable part. However, with the rapid development of the Internet, Internet security has gradually come into the attention of Internet users. [0003] In the early days of Internet development, system designers designed identity verification systems. The purpose of Internet identity verification systems is to verify whether th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F21/32G06K9/62
CPCG06F21/31G06F21/32G06F18/214G06F18/24
Inventor 秦玉海刘路强时傲东杜昊霖
Owner CHINA CRIMINAL POLICE UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products