Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

User identification method based on multi-kernel learning fused with mouse and keyboard behavior characteristics

A multi-core learning and user identification technology, applied in the field of identity recognition, can solve problems such as the inability to achieve non-interference continuous authentication, differences in mouse and keyboard operation behaviors, and differences in recognition effects.

Active Publication Date: 2020-09-04
BEIJING UNIV OF TECH +1
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Identity authentication has always been a very popular research topic in the academic field. As a new identity authentication technology, biometric authentication has been widely used in various fields. Compared with traditional technologies, biometric authentication has higher reliability. Features include physiological features and behavioral features. Physiological features become the focus of authentication due to their unique characteristics, mainly including fingerprint features, iris features and face features, etc. However, the use of physiological features not only requires additional hardware support, but also requires verification and authentication. Individual feature collection cannot achieve continuous authentication without interference, while the behavioral feature biometric system uses commonly available computer interface devices to collect data, such as keyboards and mice, and the behaviors taken during human-computer interaction do not require additional assistance. equipment, so it has the advantages of low cost
[0004] So far, user behavior characteristics have been extensively studied, mainly including keyboard dynamics and mouse dynamics. A large number of studies on keystroke dynamics and mouse dynamics have mostly adopted machine learning algorithms and statistical learning methods. With the continuous improvement of this method, the existing research has achieved remarkable results. However, due to the very large differences in various data acquisition and data processing schemes, there are also great differences in recognition effects, and the combination of mouse dynamics and keyboard dynamics The research is only a small part. In reality, there are great differences in the behavior of users operating the mouse and keyboard within a certain period of time.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User identification method based on multi-kernel learning fused with mouse and keyboard behavior characteristics
  • User identification method based on multi-kernel learning fused with mouse and keyboard behavior characteristics
  • User identification method based on multi-kernel learning fused with mouse and keyboard behavior characteristics

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] Such as figure 1 As shown, the present invention provides a user identification method based on multi-kernel learning (multiple kernel learning, MKL) fusion mouse and keyboard behavior characteristics, comprising: step 1, obtaining two types of human-computer interaction data of keyboard and mouse; Feature extraction with mouse features; step 3, feature mapping based on multi-core learning algorithm; step 4, use classifier modeling for user identification.

[0018] Step 1. Obtain human-computer interaction data of keyboard and mouse

[0019] In order to collect experimental data more realistically, 15 users were collected through the collection program in an uncontrolled environment. The data collection program uses HOOK technology, and the user can run the mouse and keyboard collection program in the background. There is no impact, and the user's operation is not subject to any restrictions. The collected data is the real data generated by the keyboard and mouse opera...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a user identification method based on multi-kernel learning fused with mouse and keyboard behavior characteristics. In an uncontrolled environment, human-computer interaction behaviors of a user are monitored through a program to obtain real data generated by keyboard and mouse operations in daily work, two characteristics of a mouse and a keyboard are extracted, characteristic fusion and efficient classification are carried out through MKL, and finally efficient identity authentication of the user is achieved.

Description

technical field [0001] The invention belongs to the technical field of identification, and in particular relates to a user identification method based on multi-kernel learning (MKL) fusion of mouse and keyboard behavior characteristics. Background technique [0002] With the rapid development of the Internet era, people's lives are closely related to the Internet. Information systems can bring convenience to people's lives, but security has become a concern for the majority of people, and how to protect users' privacy has become a problem. An important research topic. Whether it is for an enterprise or an individual, device identity authentication is unavoidable. Identity authentication is to identify the user's operating authority to the system, for example, log in to the computer system, enter the mobile phone system, and log in to the bank. For business, etc., the simplest and most traditional authentication method is user name and password authentication. After the user ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/31G06F11/34G06N7/00G06N20/10
CPCG06F21/316G06F11/3438G06N20/10G06N7/01Y02D10/00
Inventor 王秀娟郑倩倩郑康锋随艺陶元睿
Owner BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products