CN110990811A - Identity authentication method and device - Google Patents

Identity authentication method and device Download PDF

Info

Publication number
CN110990811A
CN110990811A CN201911202878.2A CN201911202878A CN110990811A CN 110990811 A CN110990811 A CN 110990811A CN 201911202878 A CN201911202878 A CN 201911202878A CN 110990811 A CN110990811 A CN 110990811A
Authority
CN
China
Prior art keywords
information
keystroke
key
sample
reward
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911202878.2A
Other languages
Chinese (zh)
Inventor
关建峰
许长桥
刘梦昕
孙建勋
李心舒
贾金锁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing University of Posts and Telecommunications
Original Assignee
Beijing University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing University of Posts and Telecommunications filed Critical Beijing University of Posts and Telecommunications
Priority to CN201911202878.2A priority Critical patent/CN110990811A/en
Publication of CN110990811A publication Critical patent/CN110990811A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Social Psychology (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the invention provides an identity authentication method and device, wherein the method comprises the following steps: acquiring authentication information and a plurality of keystroke information in the use process of a user terminal, wherein the keystroke information comprises key values of multiple keys, duration of the multiple keys and interval time of the multiple keys; determining keystroke sample information corresponding to the key values of the multi-key tapping according to the keystroke information and the authentication information, obtaining reward and punishment value information of the multi-key tapping according to the keystroke sample information corresponding to the key values of the multi-key tapping and the keystroke information, and obtaining a reward and punishment total value in the use process of the user terminal according to the reward and punishment value information of the multi-key tapping; if the reward and punishment total value is larger than the authentication threshold value, user login verification is carried out, user identity authentication is carried out by adopting the keystroke characteristic, and the user identity authentication has a higher security level compared with the traditional account password authentication.

Description

Identity authentication method and device
Technical Field
The invention relates to the technical field of computers, in particular to an identity authentication method and device.
Background
The identity authentication is mainly used for preventing lawless persons from falsely using the legal user identity, so that certain resource access and operation permission owned by the legal user identity is obtained.
The identity authentication is mainly divided into three types, the first type is authentication through user memory, for example, account password login authentication, specifically, a password set during login is input by a user, and the user can successfully log in only if the password is correct. Obviously, the usability and the security of the authentication mode are mutually exclusive, the simple and easy-to-remember password is easy to crack and leak, and the complex and safe password is difficult to remember and maintain. The second type is authentication through things owned by the user, such as mobile phone short message authentication, and when the user logs in, the received random verification code from the background of the login system is input into a verification code frame to complete the authentication of the user identity. Such authentication methods are now common and safer than the first type, but may still cause security risks due to loss and the like. The two types of authentication methods belong to the traditional authentication mode, and the third type is biological authentication which performs the authentication by utilizing the inherent physiological characteristics of a human body, has identifiability, uniqueness and availability anytime and anywhere, and enables the biological authentication to become a hotspot direction. Biometric authentication utilizes physiological characteristics inherent to a human body to perform authentication.
However, the existing identity authentication based on physiological characteristics has certain implementation difficulty and high cost, and belongs to a one-time authentication mode, that is, after the authentication is successful, whether the authentication is used by a legal user cannot be continuously authenticated. Therefore, the invention provides a portable and low-cost identity authentication scheme.
Disclosure of Invention
Embodiments of the present invention provide an identity authentication method and apparatus, so as to solve the technical problems mentioned in the foregoing background art, or at least partially solve the technical problems mentioned in the foregoing background art.
In a first aspect, an embodiment of the present invention provides an identity authentication method, including:
acquiring authentication information and a plurality of keystroke information in the use process of a user terminal, wherein the keystroke information comprises key values of multiple keys, duration of the multiple keys and interval time of the multiple keys;
determining keystroke sample information corresponding to the key values of the multi-key keystrokes according to the key values of the multi-key keystrokes and the authentication information, so as to obtain reward and punishment value information of the multi-key keystrokes according to the keystroke sample information corresponding to the key values of the multi-key keystrokes and the keystroke information, and obtain a reward and punishment total value in the use process of the user terminal according to the reward and punishment value information of the multi-key keystrokes;
and if the total reward and punishment value is larger than the authentication threshold value, performing user login verification.
More specifically, before the step of acquiring the authentication information and the plurality of key stroke information during the use of the user terminal, the method further comprises:
acquiring keystroke information when a user terminal logs in, wherein the keystroke information comprises key values of multiple keys, the duration of single key strikes, the duration of multiple key strikes and the interval time of multiple key strikes;
converting the keystroke information of the user during login into a keystroke characteristic diagram;
inputting the keystroke characteristic diagram into a trained convolutional neural network for secondary classification to obtain a first recognition result;
if the first identification result passes the verification, acquiring authentication information and a plurality of key stroke information in the use process of the user terminal;
the trained convolutional neural network is obtained by training a sample keystroke characteristic map converted from sample keystroke information when a user freely inputs multiple keys.
More specifically, before the step of inputting the keystroke characteristic map into the trained convolutional neural network for second classification to obtain a first recognition result, the method further comprises:
acquiring sample keystroke information when a user freely inputs the information, wherein the sample keystroke information comprises a sample key value for knocking multiple keys, sample knocking time length of a single key, sample duration for knocking the multiple keys and sample interval time for knocking the multiple keys;
converting the sample keystroke information into sample keystroke characteristic graphs, taking each sample keystroke characteristic graph as a training sample, and acquiring a plurality of training samples;
and training the preset convolutional neural network by using a plurality of training samples.
More specifically, the step of training the preset convolutional neural network by using a plurality of training samples specifically includes:
for any training sample, inputting the training sample into a preset convolutional neural network, and outputting a recognition result;
and when the preset training condition is met, finishing training by the preset convolutional neural network to obtain the trained convolutional neural network.
More specifically, the step of obtaining reward and punishment value information of the multi-key tap according to the keystroke sample information corresponding to the multi-key tap value and the keystroke information specifically includes:
determining similarity between the keystroke information and the keystroke sample information according to the keystroke sample information corresponding to the multi-key keystroke value and the keystroke information;
and determining the reward and punishment value information of the multi-key striking according to the similarity between the keystroke information and the keystroke sample information.
More specifically, the user login authentication specifically includes:
verifying a key value input by a user during login;
and if the verification is passed, acquiring keystroke information when the user logs in so as to verify the keystroke information when the user logs in.
In a second aspect, an embodiment of the present invention provides an identity authentication apparatus, including:
the system comprises an acquisition module, a storage module and a display module, wherein the acquisition module is used for acquiring authentication information and a plurality of keystroke information in the using process of a user terminal, and the keystroke information comprises key values of multiple keys, duration of the multiple keys and interval time of the multiple keys;
the calculation module is used for determining keystroke sample information corresponding to the key values of the multi-key keystrokes according to the key values of the multi-key keystrokes and the authentication information, obtaining reward and punishment value information of the multi-key keystrokes according to the keystroke sample information corresponding to the key values of the multi-key keystrokes and the keystroke information, and obtaining a reward and punishment total value in the use process of the user terminal according to the reward and punishment value information of the multi-key keystrokes;
and the verification module is used for performing user login verification if the reward and punishment total value is greater than the authentication threshold value.
In a third aspect, an embodiment of the present invention provides an electronic device, including a memory, a processor, and a computer program stored on the memory and executable on the processor, where the processor implements the steps of the identity authentication method according to the first aspect when executing the program.
In a fourth aspect, an embodiment of the present invention provides a non-transitory computer-readable storage medium, on which a computer program is stored, which, when executed by a processor, implements the steps of the identity authentication method according to the first aspect.
According to the identity authentication method and device provided by the embodiment of the invention, the user identity authentication is carried out by adopting the keystroke characteristic, so that the security level is higher than that of the traditional account password authentication, the method has the characteristics of low cost, easiness in popularization and the like compared with the mainstream face authentication fingerprint authentication and other methods, the keystroke characteristic in the method is a plurality of keystroke information continuously acquired in the using process of the user, and the user is continuously authenticated by adopting a weighting reward and punishment mechanism, so that the user is continuously authenticated in the using process of the computer, and the security of the user account is better ensured.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and those skilled in the art can also obtain other drawings according to the drawings without creative efforts.
FIG. 1 is a flowchart illustrating an identity authentication method according to an embodiment of the present invention;
FIG. 2 is a diagram illustrating exemplary keystroke features described in one embodiment of the present invention;
FIG. 3 is a schematic structural diagram of an identity authentication device according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 is a schematic flow chart of an identity authentication method described in an embodiment of the present invention, as shown in fig. 1, including:
step S1, obtaining authentication information and a plurality of keystroke information in the using process of the user terminal, wherein the keystroke information comprises key values of multiple keys, duration of the multiple keys and interval time of the multiple keys;
step S2, determining keystroke sample information corresponding to the key values of the multi-key keystrokes according to the key values of the multi-key keystrokes and the authentication information, obtaining reward and punishment value information of the multi-key keystrokes according to the keystroke sample information corresponding to the key values of the multi-key keystrokes and the keystroke information, and obtaining a reward and punishment total value in the using process of the user terminal according to the reward and punishment value information of the multi-key keystrokes;
and step S3, if the total reward and punishment value is greater than the authentication threshold value, performing user login verification.
Specifically, the authentication information described in the embodiment of the present invention includes multiple pieces of keystroke sample information, where each piece of keystroke sample information includes a key value of a sample multiple key, an interval time of the sample multiple keys, a tapping duration of the sample multiple keys, and an authentication threshold of each sample multiple key.
The multi-key tap described in the embodiments of the present invention specifically refers to a combination of multiple adjacent keys that are tapped in succession on a keyboard, the sample single key is a single key that constitutes the sample multi-key, and the information on the sample single key includes a key value of the sample single key, a time point at which the sample single key is pressed down, and a time point at which the sample single key is released.
The multi-key tapping duration described in the embodiments of the present invention is a time interval sequence in which a plurality of consecutive single keys are pressed down, that is, a set of data intervals arranged in sequence. The individual interval time described in the embodiments of the present invention refers to the time difference between the point at which a plurality of adjacent two single keys are released and the time when they are pressed.
The plurality of key stroke information in the using process of the user terminal described in the embodiment of the invention refers to the information which is continuously collected in the free using process of the user.
Searching the authentication threshold value of the sample multi-key corresponding to the key value and the keystroke sample information of the sample multi-key in the authentication information by knocking the key value of the multi-key of the keystroke information; then the multi-key duration and multi-key interval time of the multi-key striking and the similarity of the multi-key duration and multi-key interval time of the striking sample information are compared, so that whether the striking information passes the verification or not is judged, and the verification passes and the verification fails to correspond to different reward and punishment values.
Continuously acquiring a plurality of keystroke information in the use process of the user terminal, obtaining a plurality of reward and punishment cumulative superposition through the same sample, obtaining a reward and punishment total value, and if the reward and punishment total value is greater than an authentication threshold value, judging that the user is an illegal user at the moment, and performing user login verification.
The user login authentication described in the embodiment of the invention comprises user password verification and verification of keystroke information in the password input process of the user.
The embodiment of the invention carries out the user identity authentication by adopting the keystroke characteristic, has higher security level compared with the traditional account password authentication, has the characteristics of low cost, easy popularization and the like compared with the mainstream methods of face authentication, fingerprint authentication and the like, and the keystroke characteristic in the embodiment is a plurality of keystroke information continuously acquired in the using process of the user, and carries out the continuous identity authentication on the user by adopting a weighting reward and punishment mechanism, thereby realizing the continuous identity authentication on the user in the using process of the computer of the user, and better ensuring the security of the user account.
On the basis of the above embodiment, before the step of acquiring the authentication information and the plurality of key stroke information during the use of the user terminal, the method further includes:
acquiring keystroke information when a user terminal logs in, wherein the keystroke information comprises key values of multiple keys, the duration of single key strikes, the duration of multiple key strikes and the interval time of multiple key strikes;
converting the keystroke information of the user during login into a keystroke characteristic diagram;
inputting the keystroke characteristic diagram into a trained convolutional neural network for secondary classification to obtain a first recognition result;
if the first identification result passes the verification, acquiring authentication information and a plurality of key stroke information in the use process of the user terminal;
the trained convolutional neural network is obtained by training a sample keystroke characteristic map converted from sample keystroke information when a user freely inputs multiple keys.
Specifically, the obtaining of the keystroke information when the user terminal logs in described in the embodiment of the present invention refers to the keystroke information of the user in the process of inputting the password by logging in.
The key stroke characteristic diagram described in the embodiment of the invention is an X-axis and Y-axis coordinate system diagram established by key stroke information, the main diagonal line is the striking duration of a single key, the upper oblique line of the main diagonal line is the multi-key striking duration, and the lower oblique line of the main diagonal line is the multi-key striking interval time, so that a key stroke main sentence is constructed into a diagram.
For example, fig. 2 is an exemplary diagram of the keystroke characteristics described in an embodiment of the present invention, as shown in fig. 2, the password is "tie 5 Roaln", and then the converted image is as shown in fig. 1, and 31 keystroke characteristics of an 11-bit static password are converted into a diagram of 11X11, where the X and Y axes of the coordinates are both keystroke text information and the main diagonal is hold. key information of the 11-bit keystroke text, indicating the time interval from a certain key (key) press (Down) to bounce (Up); key, key _ next information, indicating a time interval from a certain key (Down) to the next key (key _ next) Down; key, key _ next information, which indicates a time interval from when a certain key (key) bounces Up (Up) to when the next key (key _ next) is pressed Down (Down), is the next line of the main diagonal line.
The convolution neural network with trained input described in the embodiment of the invention is specifically obtained by training a sample keystroke characteristic diagram of sample keystroke information conversion when a user freely inputs multiple keys.
Inputting the keystroke characteristic graph into the trained convolutional neural network for classification, specifically, identifying whether the keystroke characteristic graph passes the authentication.
The embodiment of the invention adopts the convolutional neural network to carry out secondary classification in the static authentication part, has stronger fitting function compared with a statistical method and other machine learning methods, and focuses more on information hidden in a space compared with a common neural network.
On the basis of the above embodiment, before the step of inputting the keystroke characteristic map into the trained convolutional neural network for second classification to obtain a first recognition result, the method further includes:
acquiring sample keystroke information when a user freely inputs the information, wherein the sample keystroke information comprises a sample key value for knocking multiple keys, sample knocking time length of a single key, sample duration for knocking the multiple keys and sample interval time for knocking the multiple keys;
converting the sample keystroke information into sample keystroke characteristic graphs, taking each sample keystroke characteristic graph as a training sample, and acquiring a plurality of training samples;
and training the preset convolutional neural network by using a plurality of training samples.
The step of training the preset convolutional neural network by using the plurality of training samples specifically includes:
for any training sample, inputting the training sample into a preset convolutional neural network, and outputting a recognition result;
and when the preset training condition is met, finishing training by the preset convolutional neural network to obtain the trained convolutional neural network.
On the basis of the above embodiment, the step of obtaining reward and punishment value information of the multi-key tap according to the keystroke sample information corresponding to the multi-key tap value and the keystroke information specifically includes:
determining similarity between the keystroke information and the keystroke sample information according to the keystroke sample information corresponding to the multi-key keystroke value and the keystroke information;
and determining the reward and punishment value information of the multi-key striking according to the similarity between the keystroke information and the keystroke sample information.
Specifically, an authentication threshold value of sample multiple keys corresponding to the key value and keystroke sample information of the sample multiple keys are searched in the authentication information, then the similarity between the duration and interval time of tapping the multiple keys and the duration and interval time of tapping the multiple keys of the keystroke sample information is compared, so that whether the keystroke information passes the verification or not is judged, the verification passes and the verification fails to correspond to different reward and punishment values, and the verification result α is compared with the verification resultγWeighting by e { -1,1} can obtain reward and punishment score βγWherein, ω isγAs a weight, the frequency of occurrence of hit multiple keys γ, fγThe number of occurrences of the multiple bond γ is indicated. The specific formula is as follows:
βγ=αγ×ωγ
Figure BDA0002296293950000081
wherein the reward and punishment score is βγ,ωγAre weights.
In the embodiment of the invention, the user identity authentication is carried out by adopting the keystroke characteristic, so that the security level is higher than that of the traditional account password authentication, and the method has the characteristics of low cost, easiness in popularization and the like compared with the mainstream face authentication fingerprint authentication and other methods.
On the basis of the above embodiment, the user login authentication specifically includes:
verifying a key value input by a user during login;
and if the verification is passed, acquiring keystroke information when the user logs in so as to verify the keystroke information when the user logs in.
Specifically, the verifying the key value input by the user during login described in the embodiment of the present invention specifically refers to verifying information input by the user during login, where the information includes, but is not limited to, a password, a smart card, and a U shield. If the information passes the verification, the keystroke information of the user login is verified, and if the verification passes, the keystroke information of the user terminal in the continuous use process is verified.
The embodiment of the invention combines the keystroke authentication and the continuous keystroke authentication during information login, thereby improving the safety of identity authentication.
Fig. 3 is a schematic structural diagram of an identity authentication apparatus according to an embodiment of the present invention, as shown in fig. 3, including: an acquisition module 310, a calculation module 320, and a verification module 330; the obtaining module 310 is configured to obtain authentication information and a plurality of pieces of keystroke information during a use process of the user terminal, where the keystroke information includes a key value for tapping multiple keys, a duration for tapping multiple keys, and a time interval between tapping multiple keys; the computing module 320 is configured to determine keystroke sample information corresponding to the key values of the multiple keystrokes according to the key values of the multiple keystrokes and the authentication information, obtain reward and punishment value information of the multiple keystrokes according to the keystroke sample information corresponding to the key values of the multiple keystrokes and the keystroke information, and obtain a reward and punishment total value in the using process of the user terminal according to the reward and punishment value information of the multiple keystrokes; the verification module 330 is configured to perform user login verification if the total reward and punishment value is greater than the authentication threshold value.
The apparatus provided in the embodiment of the present invention is used for executing the above method embodiments, and for details of the process and the details, reference is made to the above embodiments, which are not described herein again.
The embodiment of the invention has the advantages that the user identity authentication is carried out by adopting the keystroke characteristic, the security level is higher than that of the traditional account password authentication, the method has the characteristics of low cost, easiness in popularization and the like compared with the mainstream face authentication fingerprint authentication and other methods, the keystroke characteristic in the embodiment is a plurality of keystroke information continuously acquired in the using process of a user, and the user is continuously authenticated by adopting a weighting reward and punishment mechanism, so that the user is continuously authenticated in the using process of a computer, and the security of the user account is better ensured.
Fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present invention, and as shown in fig. 4, the electronic device may include: a processor (processor)410, a communication Interface 420, a memory (memory)430 and a communication bus 440, wherein the processor 410, the communication Interface 420 and the memory 430 are communicated with each other via the communication bus 440. The processor 410 may call logic instructions in the memory 430 to perform the following method: acquiring authentication information and a plurality of keystroke information in the use process of a user terminal, wherein the keystroke information comprises key values of multiple keys, duration of the multiple keys and interval time of the multiple keys; determining keystroke sample information corresponding to the key values of the multi-key tapping according to the keystroke information and the authentication information, obtaining reward and punishment value information of the multi-key tapping according to the keystroke sample information corresponding to the key values of the multi-key tapping and the keystroke information, and obtaining a reward and punishment total value in the use process of the user terminal according to the reward and punishment value information of the multi-key tapping; and if the total reward and punishment value is larger than the authentication threshold value, performing user login verification.
In addition, the logic instructions in the memory 430 may be implemented in the form of software functional units and stored in a computer readable storage medium when the software functional units are sold or used as independent products. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
An embodiment of the present invention discloses a computer program product, which includes a computer program stored on a non-transitory computer readable storage medium, the computer program including program instructions, when the program instructions are executed by a computer, the computer can execute the methods provided by the above method embodiments, for example, the method includes: acquiring authentication information and a plurality of keystroke information in the use process of a user terminal, wherein the keystroke information comprises key values of multiple keys, duration of the multiple keys and interval time of the multiple keys; determining keystroke sample information corresponding to the key values of the multi-key tapping according to the keystroke information and the authentication information, obtaining reward and punishment value information of the multi-key tapping according to the keystroke sample information corresponding to the key values of the multi-key tapping and the keystroke information, and obtaining a reward and punishment total value in the use process of the user terminal according to the reward and punishment value information of the multi-key tapping; and if the total reward and punishment value is larger than the authentication threshold value, performing user login verification.
Embodiments of the present invention provide a non-transitory computer-readable storage medium storing server instructions, where the server instructions cause a computer to execute the method provided in the foregoing embodiments, for example, the method includes: acquiring authentication information and a plurality of keystroke information in the use process of a user terminal, wherein the keystroke information comprises key values of multiple keys, duration of the multiple keys and interval time of the multiple keys; determining keystroke sample information corresponding to the key values of the multi-key tapping according to the keystroke information and the authentication information, obtaining reward and punishment value information of the multi-key tapping according to the keystroke sample information corresponding to the key values of the multi-key tapping and the keystroke information, and obtaining a reward and punishment total value in the use process of the user terminal according to the reward and punishment value information of the multi-key tapping; and if the total reward and punishment value is larger than the authentication threshold value, performing user login verification.
The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware. With this understanding in mind, the above-described technical solutions may be embodied in the form of a software product, which can be stored in a computer-readable storage medium such as ROM/RAM, magnetic disk, optical disk, etc., and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the methods described in the embodiments or some parts of the embodiments.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (9)

1. An identity authentication method, comprising:
acquiring authentication information and a plurality of keystroke information in the use process of a user terminal, wherein the keystroke information comprises key values of multiple keys, duration of the multiple keys and interval time of the multiple keys;
determining keystroke sample information corresponding to the key values of the multi-key tapping according to the keystroke information and the authentication information, obtaining reward and punishment value information of the multi-key tapping according to the keystroke sample information corresponding to the key values of the multi-key tapping and the keystroke information, and obtaining a reward and punishment total value in the use process of the user terminal according to the reward and punishment value information of the multi-key tapping;
and if the total reward and punishment value is larger than the authentication threshold value, performing user login verification.
2. The identity authentication method of claim 1, wherein before the step of obtaining authentication information and the plurality of key strokes information during the use of the user terminal, the method further comprises:
acquiring keystroke information when a user terminal logs in, wherein the keystroke information comprises key values of multiple keys, the duration of single key strikes, the duration of multiple key strikes and the interval time of multiple key strikes;
converting the keystroke information of the user during login into a keystroke characteristic diagram;
inputting the keystroke characteristic diagram into a trained convolutional neural network for secondary classification to obtain a first recognition result;
if the first identification result passes the verification, acquiring authentication information and a plurality of key stroke information in the use process of the user terminal;
the trained convolutional neural network is obtained by training a sample keystroke characteristic map converted from sample keystroke information when a user inputs multiple keys.
3. The identity authentication method of claim 2, wherein before the step of inputting the keystroke signature into the trained convolutional neural network for second classification to obtain the first recognition result, the method further comprises:
acquiring sample keystroke information when a user freely inputs multiple keys, wherein the sample keystroke information comprises sample key values for knocking the multiple keys, sample knocking time lengths of single keys, sample duration for knocking the multiple keys and sample interval time for knocking the multiple keys;
converting the sample keystroke information into sample keystroke characteristic graphs, taking each sample keystroke characteristic graph as a training sample, and acquiring a plurality of training samples;
and training the preset convolutional neural network by using a plurality of training samples.
4. The identity authentication method according to claim 3, wherein the step of training the predetermined convolutional neural network by using the plurality of training samples specifically comprises:
for any training sample, inputting the training sample into a preset convolutional neural network, and outputting a recognition result;
and when the preset training condition is met, finishing training by the preset convolutional neural network to obtain the trained convolutional neural network.
5. The identity authentication method according to claim 1, wherein the step of obtaining reward and punishment value information of the multi-key tap according to the keystroke sample information and the keystroke information corresponding to the multi-key tap value specifically comprises:
determining similarity between the keystroke information and the keystroke sample information according to the keystroke sample information corresponding to the multi-key keystroke value and the keystroke information;
and determining the reward and punishment value information of the multi-key striking according to the similarity between the keystroke information and the keystroke sample information.
6. The identity authentication method of claim 1, wherein the user login verification specifically comprises:
verifying a key value input by a user during login;
and if the verification is passed, acquiring keystroke information when the user logs in so as to verify the keystroke information when the user logs in.
7. An identity authentication apparatus, comprising:
the system comprises an acquisition module, a storage module and a display module, wherein the acquisition module is used for acquiring authentication information and a plurality of keystroke information in the using process of a user terminal, and the keystroke information comprises key values of multiple keys, duration of the multiple keys and interval time of the multiple keys;
the calculation module is used for determining keystroke sample information corresponding to the key values of the multi-key keystrokes according to the key values of the multi-key keystrokes and the authentication information, obtaining reward and punishment value information of the multi-key keystrokes according to the keystroke sample information corresponding to the key values of the multi-key keystrokes and the keystroke information, and obtaining a reward and punishment total value in the use process of the user terminal according to the reward and punishment value information of the multi-key keystrokes;
and the verification module is used for performing user login verification if the reward and punishment total value is greater than the authentication threshold value.
8. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the steps of the identity authentication method according to any one of claims 1 to 6 are implemented when the program is executed by the processor.
9. A non-transitory computer readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the identity authentication method according to any one of claims 1 to 6.
CN201911202878.2A 2019-11-29 2019-11-29 Identity authentication method and device Pending CN110990811A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911202878.2A CN110990811A (en) 2019-11-29 2019-11-29 Identity authentication method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911202878.2A CN110990811A (en) 2019-11-29 2019-11-29 Identity authentication method and device

Publications (1)

Publication Number Publication Date
CN110990811A true CN110990811A (en) 2020-04-10

Family

ID=70088503

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911202878.2A Pending CN110990811A (en) 2019-11-29 2019-11-29 Identity authentication method and device

Country Status (1)

Country Link
CN (1) CN110990811A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111488568A (en) * 2020-04-13 2020-08-04 北京字节跳动网络技术有限公司 Client method, device, equipment and storage medium
CN112507299A (en) * 2020-12-04 2021-03-16 重庆邮电大学 Self-adaptive keystroke behavior authentication method and device in continuous identity authentication system
CN113254915A (en) * 2021-05-06 2021-08-13 西安交通大学 Cross-scene and equipment keystroke behavior authentication method, system, equipment and medium
CN113434840A (en) * 2021-06-30 2021-09-24 哈尔滨工业大学 Mobile phone continuous identity authentication method and device based on feature map

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102486832A (en) * 2010-12-06 2012-06-06 中国人民解放军理工大学 User authentication method based on keystroke mode identification
US20180293393A1 (en) * 2017-04-10 2018-10-11 Adobe Systems Incorporated Electronic signature framework with keystroke biometric authentication
CN109492357A (en) * 2018-09-12 2019-03-19 华为技术有限公司 Identity identifying method, equipment and computer storage medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102486832A (en) * 2010-12-06 2012-06-06 中国人民解放军理工大学 User authentication method based on keystroke mode identification
US20180293393A1 (en) * 2017-04-10 2018-10-11 Adobe Systems Incorporated Electronic signature framework with keystroke biometric authentication
CN109492357A (en) * 2018-09-12 2019-03-19 华为技术有限公司 Identity identifying method, equipment and computer storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
刘梦昕: "基于用户击键行为的认证技术研究", 《中国优秀硕士学位论文全文数据库信息科技辑》 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111488568A (en) * 2020-04-13 2020-08-04 北京字节跳动网络技术有限公司 Client method, device, equipment and storage medium
CN111488568B (en) * 2020-04-13 2023-04-11 抖音视界有限公司 Client method, device, equipment and storage medium
CN112507299A (en) * 2020-12-04 2021-03-16 重庆邮电大学 Self-adaptive keystroke behavior authentication method and device in continuous identity authentication system
CN113254915A (en) * 2021-05-06 2021-08-13 西安交通大学 Cross-scene and equipment keystroke behavior authentication method, system, equipment and medium
CN113254915B (en) * 2021-05-06 2023-03-21 西安交通大学 Cross-scene and equipment keystroke behavior authentication method, system, equipment and medium
CN113434840A (en) * 2021-06-30 2021-09-24 哈尔滨工业大学 Mobile phone continuous identity authentication method and device based on feature map
CN113434840B (en) * 2021-06-30 2022-06-24 哈尔滨工业大学 Mobile phone continuous identity authentication method and device based on feature map

Similar Documents

Publication Publication Date Title
US10558792B2 (en) Touch-screen user key-press behavior pattern construction and analysis system and identity recognition method thereof
CN110990811A (en) Identity authentication method and device
CN108229130B (en) Verification method and device
CN104408341B (en) Smart phone user identity identifying method based on gyroscope behavioural characteristic
Ma et al. Password entropy and password quality
US20060271790A1 (en) Relative latency dynamics for identity authentication
US8533486B1 (en) Incorporating false reject data into a template for user authentication
CN108875404A (en) Data desensitization method, device and storage medium based on machine learning
CN109194689B (en) Abnormal behavior recognition method, device, server and storage medium
CN110717158B (en) Information verification method, device, equipment and computer readable storage medium
CN102223233A (en) Biological code authentication system and biological code authentication method
WO2021244531A1 (en) Payment method and apparatus based on facial recognition
CN110399708A (en) A kind of dual-identity authentication method, apparatus and electronic equipment
CN108510290A (en) Customer information amending method, device, computer equipment and storage medium in call
CN111209549A (en) Security verification method and device
CN107622208A (en) Note encryption and decryption method and related product
CN102314594B (en) Biometric authentication device and biometric authentication method
CN114448664B (en) Method and device for identifying phishing webpage, computer equipment and storage medium
CN110677239B (en) Verification code generation method and device
WO2023092345A1 (en) Identity authentication method and apparatus, and terminal, storage medium and program product
Gao et al. Usability and security of the recall-based graphical password schemes
CN105897429A (en) Authentication method, authentication device and terminal
CN112417429A (en) Security verification method and device, electronic equipment and storage medium
CN111353139A (en) Continuous authentication method and device, electronic equipment and storage medium
JP2008146138A (en) Biometrics device, biometrics system, and biometrics method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200410