User identity authentication method based on keystroke behavior, electronic equipment and storage medium
A technology for user identity authentication and storage media, applied in electronic equipment and storage media, in the field of user identity authentication based on keystroke behavior, it can solve the problems of single-dimensional matching, single data, low recognition accuracy, etc., to improve the accuracy Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0021] see figure 1 As shown, the user identity authentication method based on the keystroke behavior of the present embodiment includes the following processes:
[0022] S1: Obtain the keystroke characteristics and sensor characteristics during the keystroke process of the user to be logged in;
[0023] S2: Bring the keystroke features and the sensor features into multiple pre-trained models for verification, and obtain multiple verification results of the multiple models;
[0024] S3: Perform fusion calculation on the multiple verification results, and determine whether the user to be logged in has passed identity authentication according to the calculation results.
[0025] The above method not only utilizes the keystroke characteristics during the keystroke process, but also utilizes the sensor characteristics generated by the keystroke behavior, and verifies these characteristics through multiple models to obtain multiple verification results, and then these verification...
Embodiment 2
[0050] see image 3 As shown, preferably, when a user logs in using a terminal device (inputs a user name and a password), the data acquisition module is used to obtain the usage data of the current user, including user name, password, keystroke features and sensor features. The system authentication module first matches the user name and password with the pre-stored account information. If the matching is unsuccessful, the user will continue to input the user name and password; if the matching is successful, the model verification module will further use the keystroke characteristics and sensor If the verification is passed, the login is successful and the system is allowed to enter the system; if the verification fails, you can go back and log in again. Therefore, in the process of user identification in this embodiment, the user only needs to input the user name and password. At this time, the system automatically collects keystroke features and sensor features. Verificati...
Embodiment 3
[0056] Such as Figure 4 Shown is a schematic structural diagram of an electronic device, which includes a processor 610, a memory 620, an input device 630, and an output device 640; the number of processors 610 in the electronic device may be one or more; the processor in the electronic device 610, memory 620, input device 630, and output device 640 may be connected via a bus or in other ways.
[0057] The processor 610 runs the software programs, instructions and modules stored in the memory 620 to execute various functional applications and data processing of the electronic device, that is, to realize the keystroke behavior-based user identity authentication method in various embodiments of the present invention.
[0058] The memory 620 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system and an application program required by at least one function; the data storage area may store data created acco...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


