Font Size: a A A

Design And Implementation Of The Identity Authentication Model Based On Keystrok Dynamics

Posted on:2010-11-28Degree:MasterType:Thesis
Country:ChinaCandidate:W X LuFull Text:PDF
GTID:2178360278965838Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Authentication, which is the security system base, is also the basic element in the computer application system and the Internet application. Authentication can be implemented through such means as simple technological password, basic code identification technology and the more sophisticated biometric authentication. However, the simple technological password is not good enough for some occasions when the higher data security is expected. The uses of intelligent cards, if copied, would be worse, too. Biometric authentication can meet the highest requirement for security. Because the biometric authentication is so unique for individuals, it is impossible for it to be copied, stolen, as well as forgotten, so it is safe, convenient, counterfeit -proof. Therefore, the introduction of biometric authentication will improve security greatly in the telecommunication areas that are concerned with the customer data and financial information.Biological features will be taken and transformed into feature model through biometric authentication. Then the taken samples will be compared with the feature model to reach the goal of identification. To implement the biometric authentication, investment and R&D are needed for hardwares, which will collect the samples of finger prints and iris. No additional hardwares are needed for the keystroke sample collection which can be realization through software installed in the computers.This article deals mainly with the following aspects:Biometric authentication and its implementation is discussed. The biological features of keystroke dynamics are analyzed. The algorithm and model of keystroke dynamics is studied. Based on it, the PR-RP model is selected for the research in the article.Request model is the basis for the realization of softwares. The keystroke dynamics-based identification, i.e., login, is discussed in the aspect of request. The details of request is analyzed based upon the request is made. In the end, the request model is created.According to the request model, the request is analyzed by means of UML. Then the analysis model is constructed and the analysis classes are obtained. Third the relationship between the analysis classes is determined. Finally the act sequence sketches of the analysis classes are completed.Based on the analysis classes, the details of system login are designed. Then the design classes are obtained. Finally the coding is completed by means of the repeatedly usable general classes and C# &ASP.NET language.PR-RP model is tested and the availability of PR-RP model is validated, and the system login is tested.
Keywords/Search Tags:Biometric Authentication, Keystroke Dynamics, PR-RPmodel, FAR, FRR
PDF Full Text Request
Related items