期刊文献+

基于击键特征的用户身份校验 被引量:8

User Identity Verification Based on Recognition of Typing Style
下载PDF
导出
摘要 基于用户所特有的击键节奏特征,提出了一种判别某一击键序列是否为某特定用户的行为的方案。该方案利用非参数方法中的Spearman 相关分析来确定计算 cityblock 距离所需的权值,进而利用预存样本与新输入样本之间的距离来判定用户的身份。所以此方案不受各种可能击键的概率分布限制。一个基于击键特征的用户身份校验系统已经使用 Java 语言成功地实现。 Based on characteristic typing style of an arbitrary user, a scheme to distinguish whether a keystroke series is made by a specific user or not is proposed. The cityblock distance between samples stored in advance and the new input sample is the criterion of identity verification. This scheme uses a nonparametric method, that is, Spearman correlation analysis, to calculate the weights for computing the cityblock distance. So the variety of possible probability distributions of keystrokes is not a regulation. A user identity verification system also has been implemented successfully with Java.
作者 史扬 曹立明
出处 《计算机工程》 EI CAS CSCD 北大核心 2005年第6期120-122,共3页 Computer Engineering
基金 国家自然科学基金资助项目(70171061)
关键词 身份校验 击键特征 非参数方法 Identity verification Typing style Nonparametric method
  • 相关文献

参考文献8

  • 1Dunn A. Biometric Authentication--Real Identities tor a Virtual World. MIDAS. Project Development Final Report, 2002.
  • 2Monrose F, Rubin A. Authentication via Keystroke Dynamics. Fourth ACM Conference on Computer and Communications Security, 19973.
  • 3Kacholia V, Pandit S. Biometric Authentication Using Random Distributions [A]. Proceedings of the 15th Canadian IT Security Symposium [C]. Ottawa, Canada, 2003-05:1-8.
  • 4de Ru w G, Eloff J.Enhanced Password Authentication Through Fuzzy Logic. IEEE Expert, 1997, 12(6): 38-45.
  • 5Tapiador M, Sigienza J A. Fuzzy Keystroke Biometrics on Web Security. AutolD'99 Proceedings, Workshop on Automatic Identification Advanced Technologies, IEEE, 1999:133-136.
  • 6曲维光,宋如顺.基于用户击键特征识别的用户认证系统[J].计算机工程与应用,2002,38(16):69-70. 被引量:8
  • 7Monrose F, Reiter M K, Wetzel S. Password Hardening Based on Keystroke Dynamics [A]. Proceedings of the 6th ACM Conference on Computer and Communication Security[C]. NY, USA: ACM Press, 1999:73-82.
  • 8朱明,尹大成,陈亿霖.缓冲区溢出攻击及检测方法研究[J].计算机工程,2002,28(7):152-152. 被引量:8

二级参考文献6

共引文献14

同被引文献35

引证文献8

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部