Font Size: a A A

Design And Implementation Of Keystroke Identification And Process Monitoring System

Posted on:2015-05-11Degree:MasterType:Thesis
Country:ChinaCandidate:C X PanFull Text:PDF
GTID:2298330467485735Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the development of science and technology, biometric identify technology have increased rapidly. Biometrics refers to the physiological and behavioral characteristics inherent in the body by computers and other high-tech means for identification of individual identity. Keystroke recognition is also a means of identifying them. Keystroke recognition, refers to the input methods to identify the user, it was developed to detect intruders. Keystroke recognition compared with other biometrics, such as fingerprints, costs more cheaply, only identified by two factors..Recent years, there are many keystroke identification papers and large number of experimental data. However, since access control system has a very clear standard, false alarm rate is lower than1%, detect missing less than0.001%.With current technology, there is no detectors have achieved this kind of requirements. So, keystroke recognition applications have rarely been used in practical systems.This article have researched many papers about keystroke Dynamics, combined with the knowledge of an practical access control system, design and implement a system with simple operation, easy using and easy to extract data for analysis and process research. Extraction system for keystroke data collection, passwords keystroke recognition, keystroke long text recognition, process control and other features five modules. Keystroke data collected by the system, which not only saves to the database in order to identify the actions, but also can be output in text mode, and facilitate the study of characteristics of keystroke data. After several comparison tests, and password, long existing text recognition algorithm has been the practical effect of modified, eventually applied to the system. Based on traditional access control system, we added keystroke recognition, which can improve the anomaly detection effect and users can notice invasion warning. Simultaneously, this system also has process monitoring functionalities. System can be applied to the net exam to guarantee the security and accuracy. Through continuous improvement and testing this system eventually realized now and all statements in functions can be used correctly. I believe that our system will benefit for practical application of Keystroke recognition and have some good influence for this field.
Keywords/Search Tags:Keystroke Identification, Feature Vector, Emotion Sensing
PDF Full Text Request
Related items