CN101674184B - Identity recognition method based on user keystroke characteristic - Google Patents

Identity recognition method based on user keystroke characteristic Download PDF

Info

Publication number
CN101674184B
CN101674184B CN2009102360566A CN200910236056A CN101674184B CN 101674184 B CN101674184 B CN 101674184B CN 2009102360566 A CN2009102360566 A CN 2009102360566A CN 200910236056 A CN200910236056 A CN 200910236056A CN 101674184 B CN101674184 B CN 101674184B
Authority
CN
China
Prior art keywords
user
keystroke
data
characteristic information
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN2009102360566A
Other languages
Chinese (zh)
Other versions
CN101674184A (en
Inventor
赵建
傅念东
石继东
侯俊伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING MICRODONE NETWORK TECHNOLOGY Co Ltd
Original Assignee
BEIJING MICRODONE NETWORK TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING MICRODONE NETWORK TECHNOLOGY Co Ltd filed Critical BEIJING MICRODONE NETWORK TECHNOLOGY Co Ltd
Priority to CN2009102360566A priority Critical patent/CN101674184B/en
Publication of CN101674184A publication Critical patent/CN101674184A/en
Application granted granted Critical
Publication of CN101674184B publication Critical patent/CN101674184B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses an identity recognition method based on a user keystroke characteristic, comprising the following steps: acquiring the user keystroke characteristic information to carry out filtering treatment; tracking the acquisition process of the step 1 by a driving security protection technology and securely processing acquired the keystroke characteristic information; using an SSL and identity mutual authentication technology to transmit the keystroke characteristic information acquired in the step 1; carrying out data pretreatment on the keystroke characteristic information; adopting an algorithm for supporting the improvement of a vector machine to calculate a sample mean value of the keystroke characteristic information data, and removing the noise in a sample; taking the sample mean value after being carried out statistics and pretreatment as a new sample and calculating and outputting identity recognition data; and securely storing the obtained identity recognition data to an identity recognition database. The identity recognition method is simple and effective, easily integrates with the original system, has very high pass rate of valid users and rejection rate of invalid users, can supply and replace the existing other identity recognition technologies and has very high application and promotion values.

Description

A kind of personal identification method based on characteristics of user keystroke
Technical field
The invention belongs to field of computer information security, a kind of personal identification method based on characteristics of user keystroke is provided.
Background technology
In current identity identification technical field, two class technology comparative maturities: one is based on the token technology of smart card, USBKey or dynamic password (OTP), and a kind of is biological identification technology.
Token technology is to combine with traditional username-password mode by specific software or hardware, constitute the dual factors identification system, can improve the fail safe of identification, though develop into present application comparative maturity, exist the cost height, dispose difficulty, the user is difficult for problems such as use, need low cost at some, the application of medium safety requirements exists the difficulty of popularization.
Biological identification technology is that high-tech means is close combines by computer and optics, acoustics, biology sensor and biostatistics principle etc., utilizes intrinsic physiological property of human body (as fingerprint, face picture, iris etc.) and behavioural characteristic (as signature, sound, gait etc.) to carry out the evaluation of personal identification.All there are some defectives in biological identification technology, changed by the influence of external environment condition and causes the identification difficulty, or produce counterfeit because of the development of technology.
Summary of the invention
The object of the invention is to provide a kind of personal identification method based on characteristics of user keystroke, be intended to solve existing identity recognizing technology dispose complicated, cost is high, the problem of ease for use difference, simultaneously, the present invention has improved security of system, has realized that dual factors keep fit part identification.
A kind of personal identification method based on characteristics of user keystroke provided by the invention comprises the collecting flowchart of characteristics of user keystroke and the identification process of characteristics of user keystroke, and the concrete grammar step is as follows:
Step 1, collection characteristics of user keystroke information are also carried out filtration treatment;
When described keystroke characteristic information comprises user keystroke in information such as blanking time of time of staying of each button, adjacent key and keystroke dynamics; Keystroke characteristic information is carried out filtration treatment, and filtration treatment is meant between i8042prt driving and kbdclass driving and filters;
The keystroke characteristic information that step 2, the gatherer process that passes through driving security protection Technical Follow-Up step 1 and safe handling are gathered.
The critical code section of the keystroke characteristic information of gathering is added shell handle anti-dynamic and static debugging; Use self-testing mechanism, prevent third party's routine change program implementation logic;
Step 3, keystroke characteristic information that step 1 is gathered are by SSL and the mutual authentication techniques safe transmission of identity;
Step 4, keystroke characteristic information is carried out the data preliminary treatment;
Step 5, employing SVMs modified algorithm are calculated the sample average of keystroke characteristic information data, remove the noise in the sample; And, calculate output identification data by adding up pretreated sample average as new samples;
Step 6, store the above-mentioned identification data security that obtains into the identification database.
The invention has the advantages that:
(1) simply effective based on the personal identification method of characteristics of user keystroke, be easy to original system integrated.
(2) adopted the SVMs modified algorithm, validated user percent of pass and disabled user's reject rate are very high, can replenish and substitute existing other identity recognizing technologies, have very high application and promotional value.
Description of drawings
Fig. 1 is the personal identification method flow chart that the present invention is based on characteristics of user keystroke;
Fig. 2 is the schematic diagram that the present invention realizes gathering characteristics of user keystroke;
Fig. 3 is the identification system structural representation that the present invention is based on characteristics of user keystroke;
Fig. 4 gathers the flow chart that characteristics of user keystroke carries out user's registration in the embodiment of the invention;
Fig. 5 is the login method flow chart that carries out identification in the embodiment of the invention based on characteristics of user keystroke.
Embodiment
The present invention is described in detail below in conjunction with drawings and Examples.
The invention provides a kind of personal identification method based on characteristics of user keystroke, method flow as shown in Figure 1, described method is specific implementation as follows:
Step 1, collection characteristics of user keystroke information are also carried out filtration treatment.
When comprising user keystroke, described keystroke characteristic, also comprises the keystroke dynamics in the time of staying of each button and the blanking time of adjacent key.The incident of user keystroke is directly to be input to whole identification system based on characteristics of user keystroke by bottom input equipment keyboard, and keyboard can be desktop keyboard, keyboard of notebook computer, ATM keyboard and cell phone keyboard etc.
As shown in Figure 2, each the keystroke incident at keyboard is provided with two collection points, and corresponding respectively button is pressed T constantly DownLift T constantly with button Up, when user keystroke, gather the time difference that two moment were pressed and lifted to user keystroke, i.e. time of staying T on each key 1:
T 1=T up-T down
Record is also preserved time of staying T 1
When the user knocks a plurality of button, gather the time value of pressing and lift the moment of each button, then can be poor according to the blanking time that these time values calculating user keystrokes are pressed and lifted between the incident, the time of staying T when drawing user keystroke on each key 1, and striding the key time between two adjacent key, i.e. T blanking time of adjacent key 2=T ' Down-T Down, for example: when knocking continuous button " HELLO ", can collect time series T successively 1, T 2, T 3, T 4For the collection of keystroke dynamics a dynamics transducer only need be installed on keyboard carries out the dynamics detection and gathers getting final product.
The above-mentioned keystroke characteristic information that collects is carried out filtration treatment, and described filtration treatment can be done filtration in the junction that i8042prt drives and kbdclass drives, and also can do filtration before i8042prt drives or after the kbdclass driving.The keystroke characteristic information that obtains after filtering is more effectively with rationally.
The keystroke characteristic information that step 2, the gatherer process that passes through driving security protection Technical Follow-Up step 1 and safe handling are gathered.
Described driving security protection technology is meant that the critical code section to keystroke characteristic information adds the shell processing, anti-dynamic and static debugging; Use self-testing mechanism, prevent third party's routine change program implementation logic.
Step 3, keystroke characteristic information that step 1 is gathered are by SSL and the mutual authentication techniques safe transmission of identity;
Concrete transmission course is: gather characteristics of user keystroke information, and the data that collect are carried out the piecemeal storage, the order of determining by random factor is deposited then.
Described random factor sends to client by server end, client one-time pad enciphered data upload server.Described server end and client carry out adopting in the data transmission procedure the mutual authentication techniques safe transmission of identity to guarantee data transmission security.
Described encryption is meant the data security that adopts camouflage, perturbation technique and time factor technology etc. to guarantee safe control and keystroke characteristic information.
Step 4, keystroke characteristic information is carried out the data preliminary treatment.
After the KeyEvent that knocks generation by keyboard is hunted down, the number of division of KeyEvent on time shaft is designated as T, because user's input has n KeyEvent to produce, as importing n username and password, so obtained n value sequence T n, pass through formula again Calculate to generate the new sequence that n-1 value arranged, as the coordinate of the n-1 dimensional vector of SVMs;
The keystroke characteristic information data is carried out clustering processing, the keystroke characteristic information data of the each input of user is classified, the general recommendations user inputs 3~8 user names or password, the keystroke characteristic information of each input is as a class, characteristics of user keystroke information has the class of very big similitude to be divided into same class, and characteristics of user keystroke information has the class of very big diversity to be divided into different classes separately;
Data after the clustering processing are learnt and screened, select the bigger class characteristics of user keystroke information of similitude as data sample, other class is abandoned.
Step 5, employing SVMs modified algorithm are calculated the sample average of keystroke characteristic information data, remove the noise in the sample; And with sample average as new samples, calculate output identification data.
Step 6, store the above-mentioned identification data security that obtains into the identification database.
The mode of storage comprises fragmented storage and encrypts storage.
The keystroke characteristic information of the each input of user all with the identification database in the identification data compare, if the keystroke characteristic information and the identification data similarity in the identification database of new input are very big, the similarity requirement of compliance with system in other words, then checking is passed through, otherwise draw the identification error message, prompting is re-entered or is withdrawed from.Described similarity is that the requirement according to the required precision of system or user designs, and similarity is big more, and the accuracy of identification is big more, but high more to the action request of user's custom keystroke.
The present invention also provides a kind of identification system that is used to realize above-mentioned personal identification method based on characteristics of user keystroke, as shown in Figure 3, described identification system mainly comprises filter course driver module 201, driving security protection module 202, data security transport module 203, safe control module 301, identification proxy module 401, identification module 402 and identification database module 403, wherein filter course driver module 201 is gathered user keystroke information, and user keystroke information comprises the time of staying, the blanking time of adjacent key and keystroke dynamics size factor; Driving security protection module 202 guarantees fail safe, the reliability and availability of characteristics of user keystroke information gathering simultaneously in order to guarantee job stability, hardware compatibility, system compatibility and the self-security of filter course driver module 201; Data security transport module 203 is in order to guarantee that characteristics of user keystroke information is by the transmission security of filter course driver module 201 to safe control module 301; Safe control module 301 is transferred to identification proxy module 401 in order to the safety of protecting safe control program self and the characteristics of user keystroke information security that filter course driver module 201 is gathered; Identification proxy module 401 is responsible for collecting and preliminary treatment characteristics of user keystroke information, and pretreated characteristics of user keystroke information security is transferred to identification module 402; Identification module 402 is responsible for the keystroke characteristic information with process user such as SVMs modified algorithm, obtains user's identification data, and at last with the identification storage in identification database module 403.Keyboard 1 is the bottom input equipment, and the incident of user keystroke is directly to be input to whole identification system based on characteristics of user keystroke by keyboard 1, and keyboard 1 can be desktop keyboard, keyboard of notebook computer, ATM keyboard and cell phone keyboard etc.
At the keystroke time of keyboard 1, two collection points are set, corresponding respectively button is pressed T constantly DownLift T constantly with button Up, when user keystroke, the incident that button is pressed and lifted can trigger filter course driver module 201 and gather the time difference T that two moment were pressed and lifted to user keystroke 1=T Up-T Down, record is also preserved.
When the user knocks a plurality of button, filter course driver module 201 can collect pressing of each button and lift time value constantly, then can be poor according to the blanking time that these time values calculating user keystrokes are pressed and lifted between the incident, the time of staying T when drawing user keystroke on each key 1, and between two adjacent key, stride the key time T 2=T ' Down-T DownSo, when knocking continuous button " HELLO ", can collect T 1, T 2, T 3, T 4, as shown in Figure 2.
Filter course driver module 201 is chosen in the junction that i8042prt drives and kbdclass drives and does filtration, and the purpose of filtration is in order to make keystroke characteristic information more rationally with effective, to satisfy user's needs.Rational and effective is filtered, and can realize the compatibility of 201 pairs of different keyboards of filter course driver module, and filter course driver module 201 provided by the invention can be imported with the keystroke of USB keyboard by compatible PS2 keyboard.Simultaneously, operating systems such as filter course driver module 201 compatible Windows 2000/XP/2003/Vista/7 are distinguished and are treated operating system solves Synchronization Control and IO processing in the difference of Synchronization Control and IO processing otherness.
Described driving security protection module 202 is in order to guarantee job stability, hardware compatibility, system compatibility and the self-security of filter course driver module 201, guarantee fail safe, the reliability and availability of characteristics of user keystroke information gathering simultaneously, and realize by the following method:
(1) critical code section in the keystroke characteristic information is added shell and handle, anti-dynamic and static debugging;
(2) use self-testing mechanism, prevent third party's routine change program implementation logic;
(3) employing prevents dynamic debugging.
Described data security transport module 203 adopts the SSL escape way that keystroke characteristic information is carried out safe transmission; Data security transport module 203 with carry out mutual authentication before safe control module 301 is communicated by letter.
Described safe control module 301 finish and data security transport module 203 between mutual authentication after, keystroke characteristic information is submitted to identification proxy module 401.Concrete submission process is: safe control module 301 is gathered characteristics of user keystroke information; With the storage of image data piecemeal, the order that piecemeal storage data are determined by random factor is deposited; And use symmetric encipherment algorithm that data are encrypted, the order of determining by random factor is submitted to identification proxy module 401 at last.Symmetric encipherment algorithm is meant that the data of obtaining by camouflage and perturbation technique have used the AES symmetric cryptography.
Described identification proxy module 401 is by JAVA, C, C++, C# .NET, PHP, ASP, PERL, CGI, PYTHON supervisor structure identification module 402 callers, in order to realization the enciphered data that safe control module 301 obtains is submitted to identification module 402, and as required data is carried out necessary preliminary treatment.Described being specially:
After the KeyEvent that knocks generation by keyboard is hunted down, the number of division of KeyEvent on time shaft is designated as T, because a password input has n KeyEvent generation, so obtained n value sequence T n, pass through formula again
Figure G2009102360566D00051
Calculate to generate the new sequence that n-1 value arranged, as the coordinate of the n-1 dimensional vector of SVMs;
The keystroke characteristic information data is carried out clustering processing, the characteristics of user keystroke information data is classified, of a sort characteristics of user keystroke information has very big similitude, and the characteristics of user keystroke information between inhomogeneity has very big diversity.;
Data after the clustering processing are learnt and screened, select the bigger class characteristics of user keystroke information of similitude as data sample, other class is abandoned.
Described identification module 402 adopts the SVMs modified algorithm to calculate the sample average of keystroke characteristic information data,
Remove the noise in the sample; By adding up pretreated sample average, calculate output identification data as new samples; Described identification database module 403 is used to store the user identity identification data of handling through identification module 402, and storage mode comprises fragmented storage and encrypts storage.
Embodiment 1
Use a kind of personal identification method provided by the invention, carrying out the user when registering based on characteristics of user keystroke, its concrete recognition methods flow process as shown in Figure 4, step is as follows:
Step 1, user at first input a legal user name; The user can repeatedly input the password password according to system requirements then, for example inputs the password password 3 to 8 times;
Step 2, collection characteristics of user keystroke information.
The username and password password of keystroke incident when importing to(for) the user is gathered the time of staying T of user on each button 1T blanking time with adjacent key 2, and the keystroke dynamics, keystroke characteristic information conforms system requirements, this user's keystroke characteristic is just gathered by system by certain data format; Described system requirements is meant the user in the process of input instruction, should import the time of staying T that gathers on each button according to general normal custom 1, adjacent key T blanking time 2And the keystroke dynamics differs a very little threshold value, otherwise just thinks abnormal custom, and the prompting user re-enters the username and password password, and the accuracy of identification is high more, and is high more to user's requirement habitually.
Step 3, carry out filtration treatment, obtain more effective with consistent keystroke characteristic information, and data are carried out safe transmission and preliminary treatment gathering characteristics of user keystroke information.
Step 4, calculate the sample average of keystroke characteristic data after the preliminary treatment, and with sample average as new samples, calculate and export the identification data.
Step 5, system are with the identification database module of identification storage in the server.
Step 6, return messages are given the user, and registration is finished in prompting.
Embodiment 2
Use the personal identification method based on characteristics of user keystroke provided by the invention, carry out flow chart that the user logins identification as shown in Figure 5, concrete steps are:
Step 1, user capture system carry out user's login;
Step 2, system requirements user input the user name of registration;
The password that uses when step 3, user input registration;
Step 4, system verify earlier whether user's password is correct, if the password mistake is then returned step 3 and re-entered password; If password is correct, then system continues to verify whether user's keystroke characteristic is correct.
User's keystroke characteristic information is gathered by step 5, system when the user imports username and password, and the identification data of storing in the identification database module in this keystroke characteristic information and the server are mated.
If its keystroke characteristic information and this user keystroke characteristic coupling when registration is correct, then finish the checking of keystroke characteristic; As incorrect, then recognition failures returns and re-enters username and password, and is correct up to the keystroke characteristic information matches;
Step 6, return to user cipher and the correct information of keystroke characteristic, discern successfully, the user finishes login.

Claims (9)

1. personal identification method based on characteristics of user keystroke, it is characterized in that: described method comprises the steps:
Step 1, collection characteristics of user keystroke information are also carried out filtration treatment;
When described keystroke characteristic information comprises user keystroke in the time of staying of each button, the blanking time of adjacent key;
The keystroke characteristic information that step 2, the gatherer process that passes through driving security protection Technical Follow-Up step 1 and safe handling are gathered adds shell to critical code section and handles, anti-dynamic and static state debugging; Use self-testing mechanism, prevent third party's routine change program implementation logic;
Step 3, the keystroke characteristic information by the step 1 collection will be recognized each other the transmission of card technical security by SSL and identity;
Step 4, keystroke characteristic information are carried out the data preliminary treatment;
The sample average of step 5, calculating keystroke characteristic information data is removed the noise in the sample; And, calculate output identification data by adding up pretreated sample average as new samples;
Step 6, store the above-mentioned identification data security that obtains into the identification database.
2. a kind of personal identification method based on characteristics of user keystroke according to claim 1 is characterized in that the method for gathering characteristics of user keystroke information in the step 1 is specially:
Each keystroke incident at keyboard is provided with two collection points, and corresponding respectively button is pressed with button and lifted, and when user's key tap, gathers the user and knocks the time that incident was pressed and lifted to keyboard; The calculating user knocks keyboard and presses T constantly DownWith lift T constantly UpBetween T blanking time 1=T Up-T Down, draw user time of staying T on each button when knocking keyboard 1, and between two adjacent key, stride the key time T 2, T 2=T ' Down-T DownT ' wherein DownBe pressing constantly of adjacent next button; When the user knocked a plurality of button, the data message that collects successively was: T 1, T 2, T 3, T 4
3. a kind of personal identification method according to claim 1 based on characteristics of user keystroke, it is characterized in that: the filtration described in the step 1 is done filtration in the junction that keyboard controller drives i8042prt and keyboard filtration class driving kbdclass, realizes that filter course drives.
4. a kind of personal identification method based on characteristics of user keystroke according to claim 1 is characterized in that: the described driving security protection technology of step 2 is meant that the critical code section to keystroke characteristic information adds the shell processing, anti-dynamic and static debugging; Use self-testing mechanism, prevent third party's routine change program implementation logic.
5. a kind of personal identification method according to claim 1 based on characteristics of user keystroke, it is characterized in that: the safe transmission described in the step 3 is meant: gather characteristics of user keystroke information, and the data that collect are carried out piecemeal store, the order of determining by random factor is deposited then.
6. a kind of personal identification method according to claim 1 based on characteristics of user keystroke, it is characterized in that: the data preprocessing process described in the step 4 is: after the KeyEvent that knocks generation by keyboard is hunted down, the number of division of KeyEvent on time shaft is designated as t, because user's input has n KeyEvent to produce, so obtained n value sequence t n, pass through formula again Calculate to generate the new sequence that n-1 value arranged, as the coordinate of the n-1 dimensional vector of SVMs;
Then the keystroke characteristic information data is carried out clustering processing, the characteristics of user keystroke information data is classified, of a sort characteristics of user keystroke information has very big similitude, and the characteristics of user keystroke information between inhomogeneity has very big diversity;
Data after the clustering processing are learnt and screened, select the bigger class characteristics of user keystroke information of similitude as data sample, other class is abandoned.
7. a kind of personal identification method based on characteristics of user keystroke according to claim 1 is characterized in that: the storage mode in the step 6 comprises fragmented storage and encrypts storage.
8. an application rights requires the user registering method of 1 described personal identification method based on characteristics of user keystroke, it is characterized in that:
Step 1, user at first input a legal user name; The user is according to system requirements input password password then;
Step 2, collection characteristics of user keystroke information;
Step 3, carry out filtration treatment, obtain more effective with consistent keystroke characteristic information, and data are carried out safe transmission and preliminary treatment gathering characteristics of user keystroke information;
Step 4, calculate the sample average of keystroke characteristic data after the preliminary treatment, and with sample average as new samples, calculate and export the identification data;
Step 5, system are with the identification database module of identification storage in the server;
Step 6, return messages are given the user, and registration is finished in prompting.
9. an application rights requires the user of 1 described personal identification method based on characteristics of user keystroke to login personal identification method, it is characterized in that:
Step 1, user capture system carry out user's login;
Step 2, system requirements user input the user name of registration;
The password that uses when step 3, user input registration;
Step 4, system verify earlier whether user's password is correct, if the password mistake is then returned step 3 and re-entered password;
If password is correct, then system continues to verify whether user's keystroke characteristic is correct;
User's keystroke characteristic information is gathered by step 5, system when the user imports username and password, and the identification data of storing in the identification database module in this keystroke characteristic information and the server are mated;
If its keystroke characteristic information and this user keystroke characteristic coupling when registration is correct, then finish the checking of keystroke characteristic; As incorrect, then recognition failures returns and re-enters username and password, and is correct up to the keystroke characteristic information matches;
Step 6, return to user cipher and the correct information of keystroke characteristic, discern successfully, the user finishes login.
CN2009102360566A 2009-10-19 2009-10-19 Identity recognition method based on user keystroke characteristic Active CN101674184B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2009102360566A CN101674184B (en) 2009-10-19 2009-10-19 Identity recognition method based on user keystroke characteristic

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2009102360566A CN101674184B (en) 2009-10-19 2009-10-19 Identity recognition method based on user keystroke characteristic

Publications (2)

Publication Number Publication Date
CN101674184A CN101674184A (en) 2010-03-17
CN101674184B true CN101674184B (en) 2011-07-27

Family

ID=42021189

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2009102360566A Active CN101674184B (en) 2009-10-19 2009-10-19 Identity recognition method based on user keystroke characteristic

Country Status (1)

Country Link
CN (1) CN101674184B (en)

Families Citing this family (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102184359B (en) * 2011-04-29 2013-09-04 德讯科技股份有限公司 Method for realizing identity discrimination of operation user through keyboard and mouse input habit recognition
CN103209161B (en) * 2012-01-16 2018-05-04 深圳市腾讯计算机系统有限公司 A kind of access request processing method and processing device
CN103678965B (en) * 2012-09-14 2018-10-16 百度在线网络技术(北京)有限公司 A kind of method and device of protection mobile device safety
CN103873455B (en) * 2012-12-18 2019-05-17 阿里巴巴集团控股有限公司 A kind of method and device of information checking
CN104301286B (en) * 2013-07-15 2018-03-23 中国移动通信集团黑龙江有限公司 User log-in authentication method and device
CN104580091B (en) * 2013-10-21 2019-11-08 深圳市腾讯计算机系统有限公司 A kind of auth method, device, system and storage medium
CN105099998A (en) * 2014-04-30 2015-11-25 杭州同盾科技有限公司 Identity information authentication method, device and system
CN105450405B (en) * 2014-07-18 2018-10-02 阿里巴巴集团控股有限公司 A kind of setting of password and authentication method and system
CN104281795B (en) * 2014-09-25 2017-10-31 同济大学 Password fault-tolerance approach based on mouse behavior
CN104980279A (en) * 2014-10-16 2015-10-14 腾讯科技(深圳)有限公司 Identity authentication method, and related equipment and system
CN104462906A (en) * 2014-12-19 2015-03-25 中国农业银行股份有限公司 Mouse with information collection function and identity recognition method and system
CN105827406A (en) * 2015-01-05 2016-08-03 腾讯科技(深圳)有限公司 Identity verification method, identity verification device, and identity verification system
CN105827578B (en) * 2015-01-09 2020-07-31 腾讯科技(深圳)有限公司 Method and device for processing keystroke characteristic data
CN105991281A (en) * 2015-02-04 2016-10-05 中国移动通信集团公司 Identity authentication method, equipment and system
CN107092817B (en) * 2016-02-17 2020-08-11 杭州纳雄科技有限公司 Input information analysis method and device, and information input method and device
CN106203027A (en) * 2016-06-27 2016-12-07 联想(北京)有限公司 Information processing method and electronic equipment
CN106126996A (en) * 2016-07-15 2016-11-16 北京元支点信息安全技术有限公司 The safe logging method of a kind of Behavior-based control rule and system
CN107392121B (en) * 2017-07-06 2023-05-09 同济大学 Self-adaptive equipment identification method and system based on fingerprint identification
CN107634960B (en) * 2017-09-30 2020-07-21 北京梆梆安全科技有限公司 User identity verification method, device and system based on gyroscope fluctuation behavior
CN108306884B (en) * 2018-01-31 2020-06-16 苏州锦佰安信息技术有限公司 User identity authentication method and device
CN109492357B (en) * 2018-09-12 2022-04-05 华为技术有限公司 Identity authentication method, identity authentication equipment and computer storage medium
CN113157662A (en) * 2021-02-23 2021-07-23 北京芯盾时代科技有限公司 Behavior database construction method and device and readable storage medium
CN113032751B (en) * 2021-03-25 2022-07-01 中南大学 Identity recognition method, device, equipment and medium based on keystroke characteristics of mobile equipment
CN112765579B (en) * 2021-04-06 2021-07-09 北京芯盾时代科技有限公司 User identity identification method, device, equipment and storage medium
CN113343189A (en) * 2021-07-01 2021-09-03 百融云创科技股份有限公司 Method and device for preventing malicious swiping of short message verification code
CN114760074B (en) * 2022-06-13 2022-09-02 中广(绍兴上虞)有线信息网络有限公司 Identity authentication method and system based on big data security

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101478401A (en) * 2009-01-21 2009-07-08 东北大学 Authentication method and system based on key stroke characteristic recognition
CN101557287A (en) * 2008-04-07 2009-10-14 冀连有 Method for identity identification according to characteristics of user keystroke

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101557287A (en) * 2008-04-07 2009-10-14 冀连有 Method for identity identification according to characteristics of user keystroke
CN101478401A (en) * 2009-01-21 2009-07-08 东北大学 Authentication method and system based on key stroke characteristic recognition

Also Published As

Publication number Publication date
CN101674184A (en) 2010-03-17

Similar Documents

Publication Publication Date Title
CN101674184B (en) Identity recognition method based on user keystroke characteristic
Yang et al. Security and accuracy of fingerprint-based biometrics: A review
CN104408341B (en) Smart phone user identity identifying method based on gyroscope behavioural characteristic
Breebaart et al. A reference architecture for biometric template protection based on pseudo identities
US20190130411A1 (en) Method and system for data processing
CN103699995A (en) Payment authentication method based on fingerprints and finger veins
CN104537290A (en) Password system and achievement method based on multi-fingerprint identification
CN103793640A (en) Method and system for applying biological identification technology to USB Key
CN106878344A (en) A kind of biological characteristic authentication, register method and device
de-Marcos et al. Comparing machine learning classifiers for continuous authentication on mobile devices by keystroke dynamics
CN1655505A (en) Bank cashier safety system and method
WO2021011054A1 (en) System and method for authentication using biometric hash strings
Lee et al. Patenting trends in biometric technology of the Big Five patent offices
Giot et al. Keystroke dynamics authentication
CN103207963A (en) Two-factor authentication system based on fingerprint and vein recognition
Ara et al. An efficient privacy-preserving user authentication scheme using image processing and blockchain technologies
CN102034034B (en) Biological authentication device
Reichinger et al. Continuous mobile user authentication using combined biometric traits
CN201674507U (en) Personal identification system based on keystroke dynamics of users
CN103700151A (en) Morning run check-in method
Raina Integration of Biometric authentication procedure in customer oriented payment system in trusted mobile devices.
Ameh et al. Securing cardless automated teller machine transactions using bimodal authentication system
Alotaibi et al. A novel transparent user authentication approach for mobile applications
WO2018154190A1 (en) Biometric system for dynamic access control
Stragapede et al. Mobile passive authentication through touchscreen and background sensor data

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant