Unlock instant, AI-driven research and patent intelligence for your innovation.

User identity authentication method based on keystroke behavior, electronic equipment and storage medium

A technology for user identity authentication and storage media, applied in electronic equipment and storage media, in the field of user identity authentication based on keystroke behavior, it can solve the problems of single-dimensional matching, single data, low recognition accuracy, etc., to improve the accuracy Effect

Pending Publication Date: 2021-01-15
TONGDUN HLDG CO LTD
View PDF1 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The defect that this method exists is: only carry out identity recognition based on keystroke feature information (key press time, key release time, key bounce time and keystroke fingerprint feature), the data is single, so the accuracy of identification is low; and, In the process of recognition, the obtained user keystroke features are matched with the template in the database in a single dimension, which will also lead to low recognition accuracy.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User identity authentication method based on keystroke behavior, electronic equipment and storage medium
  • User identity authentication method based on keystroke behavior, electronic equipment and storage medium
  • User identity authentication method based on keystroke behavior, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0021] see figure 1 As shown, the user identity authentication method based on the keystroke behavior of the present embodiment includes the following processes:

[0022] S1: Obtain the keystroke characteristics and sensor characteristics during the keystroke process of the user to be logged in;

[0023] S2: Bring the keystroke features and the sensor features into multiple pre-trained models for verification, and obtain multiple verification results of the multiple models;

[0024] S3: Perform fusion calculation on the multiple verification results, and determine whether the user to be logged in has passed identity authentication according to the calculation results.

[0025] The above method not only utilizes the keystroke characteristics during the keystroke process, but also utilizes the sensor characteristics generated by the keystroke behavior, and verifies these characteristics through multiple models to obtain multiple verification results, and then these verification...

Embodiment 2

[0050] see image 3 As shown, preferably, when a user logs in using a terminal device (inputs a user name and a password), the data acquisition module is used to obtain the usage data of the current user, including user name, password, keystroke features and sensor features. The system authentication module first matches the user name and password with the pre-stored account information. If the matching is unsuccessful, the user will continue to input the user name and password; if the matching is successful, the model verification module will further use the keystroke characteristics and sensor If the verification is passed, the login is successful and the system is allowed to enter the system; if the verification fails, you can go back and log in again. Therefore, in the process of user identification in this embodiment, the user only needs to input the user name and password. At this time, the system automatically collects keystroke features and sensor features. Verificati...

Embodiment 3

[0056] Such as Figure 4 Shown is a schematic structural diagram of an electronic device, which includes a processor 610, a memory 620, an input device 630, and an output device 640; the number of processors 610 in the electronic device may be one or more; the processor in the electronic device 610, memory 620, input device 630, and output device 640 may be connected via a bus or in other ways.

[0057] The processor 610 runs the software programs, instructions and modules stored in the memory 620 to execute various functional applications and data processing of the electronic device, that is, to realize the keystroke behavior-based user identity authentication method in various embodiments of the present invention.

[0058] The memory 620 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system and an application program required by at least one function; the data storage area may store data created acco...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a user identity authentication method based on a keystroke behavior, electronic equipment and a storage medium, and belongs to the technical field of identity recognition, themethod comprises the following steps: acquiring keystroke features and sensor features in a keystroke process of a user to be logged in; substituting the keystroke features and the sensor features into a plurality of pre-trained models for verification to obtain a plurality of verification results of the plurality of models; and performing fusion calculation on the plurality of verification results, and determining whether the to-be-logged-in user passes identity authentication or not according to a calculation result. According to the embodiment of the invention, the keystroke features and the sensor features generated based on the keystroke behaviors are utilized, the plurality of models are utilized to verify the features to obtain the plurality of verification results, and the verification results are subjected to fusion calculation, so that the user identity is authenticated according to the calculation results, and the user experience is improved. The accuracy of identity recognition can be greatly improved.

Description

technical field [0001] The invention relates to the technical field of identification, in particular to a method for authenticating user identity based on keystroke behavior, electronic equipment and a storage medium. Background technique [0002] With the rapid development of technology, the identity security of users on the Internet is becoming more and more important. The traditional identity authentication method is to verify the information related to the user account, and its security is relatively weak. Considering that each user's keystroke behavior and habits are unique and difficult to be imitated and embezzled by others, the purpose of user identification can be achieved according to the user's keystroke method. [0003] For example, Chinese invention patent application CN110443012A discloses an identification method based on keystroke features: collect keystroke data generated by users; perform keystroke data preprocessing and keystroke feature extraction on key...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/32G06K9/62G06N20/00
CPCG06F21/32G06N20/00G06F18/24G06F18/253
Inventor 鲍明广
Owner TONGDUN HLDG CO LTD