Font Size: a A A

Design And Implementation Of Identity Authentication Platform Based On Keyboard And Mouse Operation

Posted on:2022-08-05Degree:MasterType:Thesis
Country:ChinaCandidate:Y J ChengFull Text:PDF
GTID:2518306338468484Subject:Computer technology
Abstract/Summary:PDF Full Text Request
In the security protection of user information,identity authentication plays an important role.However,the traditional static password authentication is one-time authentication,which is vulnerable to internal attacks,and can not meet the current needs of people for security.In order to make up for the shortcomings of traditional authentication,continuous identity authentication based on gait,keyboard and mouse,gesture and other features has gradually emerged.Among them,keyboard and mouse authentication is widely concerned because it does not need additional equipment and is easy to use.However,keyboard and mouse authentication also has some disadvantages,such as low accuracy of user individual authentication,weak usability of keyboard and mouse authentication.In view of the above problems,considering the user's demand for security,convenience and sustainability,the thesis proposes and designs an identity authentication system based on user key and mouse operation.The specific contents are as follows:(1)A static identity authentication method is proposed,which clusters the features automatically in the model training stage.In this method,the density based DBSCAN clustering algorithm is extended.In the training phase of the model,the expanded algorithm is used to automatically aggregate the keystroke features,and then the aggregated features are used as classification features for classification authentication.Among them,the features after automatic aggregation can show the user's personal characteristics better,so it further improves the accuracy of authentication and realizes the static identity authentication when the user logs in;(2)This thesis proposes a dynamic identity authentication method based on the combination of the characteristics of the specified time period and the trust model.In this method,the features of fixed time period are classified,and the features of fixed time period are divided into three categories according to the key mouse factors.If the time period contains double factors of keystroke and mouse,the features are fused,different classification algorithms are used to classify different types of features,and the classification model is combined with the trust model to realize the basic classification Continuous identity authentication for keyboard and mouse operation;(3)This thesis designs and implements a continuous identity authentication system based on trust model.According to the needs of practical application,combined with static authentication based on fixed text and dynamic authentication based on keyboard and mouse behavior,two modules of static authentication and dynamic authentication are designed,which can better guarantee the information security performance of users.
Keywords/Search Tags:Information security, Key-mouse operation, Static authentication, Continuous authentication
PDF Full Text Request
Related items