CN101557287A - Method for identity identification according to characteristics of user keystroke - Google Patents

Method for identity identification according to characteristics of user keystroke Download PDF

Info

Publication number
CN101557287A
CN101557287A CNA2008100109371A CN200810010937A CN101557287A CN 101557287 A CN101557287 A CN 101557287A CN A2008100109371 A CNA2008100109371 A CN A2008100109371A CN 200810010937 A CN200810010937 A CN 200810010937A CN 101557287 A CN101557287 A CN 101557287A
Authority
CN
China
Prior art keywords
user
keystroke
password
authentication
usemame
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2008100109371A
Other languages
Chinese (zh)
Inventor
冀连有
冀连权
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CNA2008100109371A priority Critical patent/CN101557287A/en
Publication of CN101557287A publication Critical patent/CN101557287A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention relates to a method for identity identification of a user of a computer and other terminal devices, in particular to a method for identity identification of users in the network world in the inputting process through a keyboard. The method is characterized in that a method for identification according to the characteristics of a user keystroke is added on the basis of a traditional username/password pair identification mechanism. Due to the adoption of the method, the safety of the system can be enhanced, and the disabled users are prevented from logging in by the identity of a validated user to access the resources in the system; and even if the disabled user knows the username/password pairs of the validated user, since the keystroke characteristic of the validated user is generally different from that of the user corresponding to the username/password pairs, the authentication is not available, therefore, the provided identification method has higher security.

Description

A kind of method of carrying out authentication according to characteristics of user keystroke
[technical field]
The present invention relates to a kind of user and carry out identity identifying method, refer to a kind of method of its identity being verified when the user imports by keyboard in network world especially terminal equipments such as computers.
[background technology]
The fast development of Internet technology has changed the computed mode of people, and makes people obtain information and resource more easily in the world whenever and wherever possible.Yet this also makes the chance that malicious attack and invasion take place increase greatly.Therefore, the reliability of user identity becomes an important problem in the assurance network.
Traditionally, all be to use usemame/password user identity to be authenticated to coming.The user is by after the authentication phase, and system just thinks that user identity is consistent, and seldom uses other mechanism to come constantly user identity to be confirmed.This brings, and a serious problem---it is right that in a single day the assailant obtains usemame/password, just can be by authentication, with the resource in this user's the identity accesses network.
The present invention proposes a kind ofly according to the keystroke characteristic of user when terminal equipments such as keyboard are imported, the method to user identity authenticates to a great extent, can solve the problem that proposes above.
[summary of the invention]
Purpose of the present invention aims to provide a kind of method of carrying out authentication according to characteristics of user keystroke with higher security feature.
The object of the present invention is achieved like this, a kind ofly carries out identity identifying method according to characteristics of user keystroke, may further comprise the steps:
(1) for new user, must register, set up information such as user name, password.
(2) require the user of completing steps (1) to import the literal of several times given content.
(3) computer (if other terminal equipment) carries out record to the character and the time information of the each input of user, mainly comprises: button, the time of depressing, the time of upspringing etc.
(4) after the user finished the input of predetermined number of times, computer utilized this user's of its storage keystroke information, set up and store this user's keystroke model, as characteristic informations such as keystroke duration, the keystroke time intervals.
(5) when passing through the logging in system by user of aforementioned 4 steps, this method requires its input username and password, if these two all correct, then authentication can be proceeded, and carries out step (6), otherwise, system thinks that this user is illegal user, jumps to step (11).
(6) literal of one section appointment is imported in requirement by the user of step (5).
(7) computer extracts necessary keystroke information according to the input of user in the step (6), specifically corresponding in the keystroke information that will extract and the step (4).
(8) computer keystroke information that step (7) is obtained, this user's who sets up with step (4) keystroke model compares, if coupling then jumps to step (9), otherwise, jump to step (10).
(9) system thinks that the user identity that this user and step (5) claim is consistent, and by authentication phase, the user can visit this user can accessed resources.Jump to step (11).
(10) system thinks that the user identity of claiming in this user and the step (5) is inconsistent, and this user can not pass through authentication phase.Refusing user that this user capture step (5) claimed can accessed resources.If this user also wants to authenticate, can jump to step (5), carry out the authentication of a new round.Otherwise, jump to step (11).
(11) authentication finishes.
The keystroke duration of mentioning in the described step (5), refer to some buttons and be carved into time interval between discharging constantly when depressing.
The keystroke time interval of mentioning in the described step (5), refer to time interval of twice continuous keystroke (being also referred to as the biliteral group).Also can expand to n continuous keystroke (being called n letter group).
Whether coupling in the described step (8), balancing method mainly comprises: whether (a) same index, the deviation between two desired values that compare be within the threshold values of setting.If be lower than the threshold values of setting, then think this index coupling; Otherwise, think that this index does not match.For example, in the user keystroke model in the keystroke duration of alphabetical a and the active user's input process deviation of the keystroke duration of alphabetical a whether within 5%.Wherein 5% be a threshold values.(b) all indexs that compare, whether matching rate is higher than the standard of setting.For example, whether 26 letters of user input have 90% keystroke duration deviation within 5%, if, then think coupling (being the coupling in the step (8)), otherwise, think not match.
In the described step (10), can prevent to obtain the right disabled user of usemame/password and constantly attempt passing through authentication by set maximum failure login times that same user allows in a time period (as 24 hours) with the identity of this user name.
After adopting the authentication method of the present invention's proposition, the disabled user is reduced greatly by the possibility that authenticates, therefore greatly improve security of system.
[description of drawings]
Fig. 1 is the flow chart that the method for employing the present invention proposition is carried out authentication.
[embodiment]
The method that the present invention proposes mainly is improvement and the reinforcement of carrying out on to the basis of authentication method in traditional usemame/password.Introduce the execution mode of the method for the present invention's proposition below in detail.
The enforcement of the method that the present invention proposes mainly comprises three aspects: keystroke information collection, training stage and authentication phase.
Wherein keystroke information collection had both comprised that the training stage user imported the keystroke information collection of carrying out in the text process of several times appointment, comprised that also authentication phase requires the user to import keystroke information collection in the text process of appointment.
Training stage mainly is meant to require the user to import the several times specify text, by the keystroke information of gathering is processed, sets up the user keystroke model in this process.In fact, the keystroke model of setting up for different user is different, and therefore, we just can come user identity is authenticated by keystroke characteristic.
Authentication phase is meant the user by the training stage, when needing login system, access resources, and the authentication that must carry out.Mainly be the user by usemame/password to the authentication the basis on, require the user to import the text of appointment, in this process, gather user's keystroke information, the keystroke model of user name respective user with in the usemame/password that itself and training stage are set up compares, whether mate according to keystroke characteristic, determine whether this user really is user corresponding in the usemame/password.
If in authentication phase, the user is rejected, but this user also thinks to carry out once more authentication, then can from require its input usemame/password to, the repetition verification process.
In the specific implementation process, can come limited subscriber constantly to carry out authentication, prevent that the disabled user from coming by authentication by continuous trial by maximum failure login times that same user allowed in a time period (as 24 hours) are set.

Claims (4)

1, a kind of method of carrying out authentication according to characteristics of user keystroke, its feature comprise the steps: (1) new user's registration, set up usemame/password information; (2) train: the user that look for novelty imports the text of several times appointment, sets up and store this user's keystroke model on this basis; (3) authentication phase: when the user who finishes the training stage wants login system, at first require its input right user name and password right, if, then enter next step (step (4)) by this step; (4) require this user to import the text of appointment, according to the keystroke characteristic information in the input process, compare with this user's who sets up in the step (2) keystroke model, if coupling, then by authentication, this user can accessing step (3) in the usemame/password centering user name institute respective user of input can accessed resources, otherwise, refuse this user (promptly by authentication).
2, a kind of identity identifying method as claimed in claim 1 is characterized in that: traditional utilize usemame/password to the basis of carrying out authentication on, carry out authentication according to user's keystroke characteristic.
3, a kind of identity identifying method as claimed in claim 1, it is characterized in that: new user is after finishing traditional information such as usemame/password registration, need carry out the training of training stage, specifically be the text that the requirement user imports the several times appointment, sets up this user's keystroke model on this basis.
4, a kind of identity identifying method as claimed in claim 1, it is characterized in that: when the user logins, by traditional usemame/password to the authentication after, still need the user to import one section text of appointment, on this basis, extract the feature of active user's keystroke, with its therewith the pairing keystroke model of user name of usemame/password centering compare, has only coupling, just can be by authentication, otherwise this user refuses in system, thinks this user pairing user of user name that to be not it input in to verification process in usemame/password.
CNA2008100109371A 2008-04-07 2008-04-07 Method for identity identification according to characteristics of user keystroke Pending CN101557287A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2008100109371A CN101557287A (en) 2008-04-07 2008-04-07 Method for identity identification according to characteristics of user keystroke

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2008100109371A CN101557287A (en) 2008-04-07 2008-04-07 Method for identity identification according to characteristics of user keystroke

Publications (1)

Publication Number Publication Date
CN101557287A true CN101557287A (en) 2009-10-14

Family

ID=41175241

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2008100109371A Pending CN101557287A (en) 2008-04-07 2008-04-07 Method for identity identification according to characteristics of user keystroke

Country Status (1)

Country Link
CN (1) CN101557287A (en)

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101833619A (en) * 2010-04-29 2010-09-15 西安交通大学 Method for judging identity based on keyboard-mouse crossed certification
CN101833626A (en) * 2010-05-19 2010-09-15 西安交通大学 Method for verifying computer user identity based on keystroke scrambling characteristic
CN101674184B (en) * 2009-10-19 2011-07-27 北京微通新成网络科技有限公司 Identity recognition method based on user keystroke characteristic
CN102955908A (en) * 2011-08-31 2013-03-06 国际商业机器公司 Method and device for creating rhythm password and carrying out verification according to rhythm password
CN103209161A (en) * 2012-01-16 2013-07-17 深圳市腾讯计算机系统有限公司 Method and device for processing access requests
CN103455738A (en) * 2012-06-04 2013-12-18 国际商业机器公司 Method and computer device for providing time ratio-based password/challenge authentication
CN104301286A (en) * 2013-07-15 2015-01-21 中国移动通信集团黑龙江有限公司 User login authentication method and device
CN104980279A (en) * 2014-10-16 2015-10-14 腾讯科技(深圳)有限公司 Identity authentication method, and related equipment and system
CN105099998A (en) * 2014-04-30 2015-11-25 杭州同盾科技有限公司 Identity information authentication method, device and system
CN105429937A (en) * 2015-10-22 2016-03-23 同济大学 Identity authentication method and system based on keystroke behaviors
CN105450412A (en) * 2014-08-19 2016-03-30 阿里巴巴集团控股有限公司 Identity authentication method and device
CN105827406A (en) * 2015-01-05 2016-08-03 腾讯科技(深圳)有限公司 Identity verification method, identity verification device, and identity verification system
CN105933267A (en) * 2015-08-21 2016-09-07 中国银联股份有限公司 Identity authentication method and device
CN105991281A (en) * 2015-02-04 2016-10-05 中国移动通信集团公司 Identity authentication method, equipment and system
US9600653B2 (en) 2011-09-30 2017-03-21 International Business Machines Corporation Providing time ratio-based password/challenge authentication
CN109446780A (en) * 2018-11-01 2019-03-08 北京知道创宇信息技术有限公司 A kind of identity identifying method, device and its storage medium
CN110570199A (en) * 2019-07-24 2019-12-13 中国科学院信息工程研究所 User identity detection method and system based on user input behaviors
CN111416809A (en) * 2020-03-13 2020-07-14 国网河北省电力有限公司信息通信分公司 Continuous authentication method and device based on keystroke recognition
CN112231668A (en) * 2020-09-18 2021-01-15 同盾控股有限公司 User identity authentication method based on keystroke behavior, electronic equipment and storage medium

Cited By (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101674184B (en) * 2009-10-19 2011-07-27 北京微通新成网络科技有限公司 Identity recognition method based on user keystroke characteristic
CN101833619A (en) * 2010-04-29 2010-09-15 西安交通大学 Method for judging identity based on keyboard-mouse crossed certification
CN101833626A (en) * 2010-05-19 2010-09-15 西安交通大学 Method for verifying computer user identity based on keystroke scrambling characteristic
GB2509264B (en) * 2011-08-31 2020-02-19 Ibm Create rhythmic password and authenticate based on rhythmic password
GB2509264A (en) * 2011-08-31 2014-06-25 Ibm Create rhythmic password and authenticate based on rhythmic password
CN102955908B (en) * 2011-08-31 2015-08-12 国际商业机器公司 Create the method and apparatus that rhythm password and carrying out according to rhythm password is verified
WO2013029412A1 (en) * 2011-08-31 2013-03-07 International Business Machines Corporation Create rhythmic password and authenticate based on rhythmic password
CN102955908A (en) * 2011-08-31 2013-03-06 国际商业机器公司 Method and device for creating rhythm password and carrying out verification according to rhythm password
US9600653B2 (en) 2011-09-30 2017-03-21 International Business Machines Corporation Providing time ratio-based password/challenge authentication
CN103209161B (en) * 2012-01-16 2018-05-04 深圳市腾讯计算机系统有限公司 A kind of access request processing method and processing device
CN103209161A (en) * 2012-01-16 2013-07-17 深圳市腾讯计算机系统有限公司 Method and device for processing access requests
CN103455738A (en) * 2012-06-04 2013-12-18 国际商业机器公司 Method and computer device for providing time ratio-based password/challenge authentication
CN104301286A (en) * 2013-07-15 2015-01-21 中国移动通信集团黑龙江有限公司 User login authentication method and device
CN104301286B (en) * 2013-07-15 2018-03-23 中国移动通信集团黑龙江有限公司 User log-in authentication method and device
CN105099998A (en) * 2014-04-30 2015-11-25 杭州同盾科技有限公司 Identity information authentication method, device and system
CN105450412A (en) * 2014-08-19 2016-03-30 阿里巴巴集团控股有限公司 Identity authentication method and device
CN105450412B (en) * 2014-08-19 2019-04-30 阿里巴巴集团控股有限公司 Identity identifying method and device
CN104980279A (en) * 2014-10-16 2015-10-14 腾讯科技(深圳)有限公司 Identity authentication method, and related equipment and system
CN105827406A (en) * 2015-01-05 2016-08-03 腾讯科技(深圳)有限公司 Identity verification method, identity verification device, and identity verification system
CN105991281A (en) * 2015-02-04 2016-10-05 中国移动通信集团公司 Identity authentication method, equipment and system
CN105933267A (en) * 2015-08-21 2016-09-07 中国银联股份有限公司 Identity authentication method and device
CN105429937B (en) * 2015-10-22 2018-07-06 同济大学 Identity identifying method and system based on keystroke behavior
CN105429937A (en) * 2015-10-22 2016-03-23 同济大学 Identity authentication method and system based on keystroke behaviors
CN109446780A (en) * 2018-11-01 2019-03-08 北京知道创宇信息技术有限公司 A kind of identity identifying method, device and its storage medium
CN109446780B (en) * 2018-11-01 2020-11-27 北京知道创宇信息技术股份有限公司 Identity authentication method, device and storage medium thereof
CN110570199A (en) * 2019-07-24 2019-12-13 中国科学院信息工程研究所 User identity detection method and system based on user input behaviors
CN110570199B (en) * 2019-07-24 2022-10-11 中国科学院信息工程研究所 User identity detection method and system based on user input behaviors
CN111416809A (en) * 2020-03-13 2020-07-14 国网河北省电力有限公司信息通信分公司 Continuous authentication method and device based on keystroke recognition
CN112231668A (en) * 2020-09-18 2021-01-15 同盾控股有限公司 User identity authentication method based on keystroke behavior, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN101557287A (en) Method for identity identification according to characteristics of user keystroke
CN104036780B (en) Man-machine identification method and system
CN101453458B (en) Personal identification process for dynamic cipher password bidirectional authentication based on multiple variables
US20200402046A1 (en) Unique transaction identifier, which may also include a time expiration value, is assigned by a first network website to an electronic instruction to collect specified distinctive identifiers from a local/mobile computing device seeking access to said first network website
CN105323253B (en) Identity verification method and device
WO2007139644A3 (en) Graphical image authentication and security system
Sule et al. Cybersecurity through the lens of digital identity and data protection: issues and trends
CN101174948A (en) Network login system and method with face authentication
CN102664903A (en) Network user identifying method and system
CN107612880A (en) One kind applies access method and device
CN104253818B (en) Server, terminal authentication method and server, terminal
CN104158664A (en) Identity authentication method and system
Huang et al. Development of a typing behaviour recognition mechanism on android
CN107864112A (en) Log in safe verification method and device
CN101702729A (en) Method for verifying generated identity based on coordinate technology
CN106650361A (en) Unblocking method and device
CN102160354A (en) Server system and method for providing at least one service
CN109460653A (en) Verification method, verifying equipment, storage medium and the device of rule-based engine
CN114885329A (en) Information security system based on wireless communication network
CN105681350A (en) Zero interaction double-factor authentication system and method
CN103428698A (en) Identity strong authentication method of mobile interconnection participants
US11935348B2 (en) System and method for biometric access control
Hossain et al. Adding Knock Code Technology as a Third Authentication Element to a Global Two-factor Authentication System
CN107844290B (en) Software product design method and device based on data stream security threat analysis
CN105071993A (en) Encryption state detection method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Open date: 20091014