CN108875426A - Password identification method - Google Patents

Password identification method Download PDF

Info

Publication number
CN108875426A
CN108875426A CN201810649882.2A CN201810649882A CN108875426A CN 108875426 A CN108875426 A CN 108875426A CN 201810649882 A CN201810649882 A CN 201810649882A CN 108875426 A CN108875426 A CN 108875426A
Authority
CN
China
Prior art keywords
password input
password
information
acquisition
action
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810649882.2A
Other languages
Chinese (zh)
Inventor
胡渐佳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201810649882.2A priority Critical patent/CN108875426A/en
Publication of CN108875426A publication Critical patent/CN108875426A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Lock And Its Accessories (AREA)

Abstract

Action message during Password Input is a kind of individual information feature, has differences between different people.The present invention proposes a kind of password identification method, while acquiring password, acquire the action message during Password Input, even if encrypted message input is correct,, also can not be by password authentification if the action message during Password Input is incorrect, and judge that password is stolen accordingly, it takes timely measure, prevents loss occurrence.The present invention becomes an organic whole using Password Input motor habit as another encryption information of password behind, with password itself, greatly improves the safety of password, and simple and convenient.

Description

Password identification method
Technical field
The present invention relates to IT technology more particularly to a kind of password identification methods.
Background technique
Password is convenient and efficient, and application scenarios are very extensive, but password is stolen and brings a lot of trouble to the password owner, mesh Before be not possible to learn that password has been stolen in advance, only after causing damages, by investigation just know have occurred password be stolen, A kind of technical method that the recognition code before loss occurrence is stolen is needed, the safety of password is improved.
Summary of the invention
The object of the present invention is to provide a kind of password identification methods, by believing encrypted message and Password Input process action The comprehensive descision of breath identifies, improves the safety of password, and can be found that password is stolen.
A kind of password identification method proposed by the present invention, feature include the following steps:
Establish the action recognition information of Password Input process;
Acquire the action message of encrypted message and Password Input process;
Whether the encrypted message of verifying acquisition coincide with preset cipher code recognition information, compares the Password Input action message of acquisition It is whether consistent with established Password Input action recognition information;
If the encrypted message and preset cipher code recognition information of acquisition coincide, meanwhile, the Password Input action message of acquisition with Established Password Input action recognition information is consistent, judges that Password Input is correct, otherwise, judges that Password Input is incorrect.
Action message during Password Input, such as pressing or dynamics, the Password Input speed, rhythm of clicking number key Equal motor habits, the walking of the same person are spoken etc. as habits, are a kind of individual information features, it is poor to exist between different people It is different.Using Password Input motor habit as another encryption information of password behind, become one with password itself has the present invention Machine is whole, greatly improves the safety of password, and simple and convenient.Password Input action recognition information can be practised according to user It is used to be established automatically by deep learning method or statistical method, it can also especially be set by user, the present invention is close in acquisition While code information, the action message during Password Input is acquired, even if encrypted message input is correct, if Password Input mistake Action message in journey is incorrect, also can not be by password authentification, and judges that password is stolen accordingly, takes timely measure, prevents Loss occurrence.
Below with reference to embodiment, the technical schemes of the invention are described in detail.
Detailed description of the invention
The duration schematic diagram for pressing the number key is clicked when Fig. 1 is Password Input.
Fig. 2 is the time interval schematic diagram inputted between two adjacent Password Inputs.
The pressure schematic diagram of the number key is clicked in pressing when Fig. 3 is Password Input.
Fig. 4 is Password Input key time durations curve graph.
Fig. 5 is password identification method flow diagram.
Specific embodiment
Password Input is finger pressing or the action process for clicking several number keys, and the power of number key is clicked in different people pressing Degree, the speed of input password or rhythm etc. are different, and can reflect that the different of different people input by Password Input action message Habit or feature.When the Password Input action message includes Password Input click or press the number key duration or Dead time or Password Input between Password Input click one or more combinations in the pressure value for pressing the number key.
It is shown in FIG. 1 that the duration schematic diagram for pressing the number key is clicked when being Password Input, it is assumed that password is one 6 Bit digital, abscissa indicate that the sequence n of Password Input, ordinate indicate time t, it can be seen that when the 1st, 4 Password Input The duration that number key is pressed is relatively long, and the duration that number key when the 2nd, 6 Password Input is pressed is opposite It is shorter, that is, during Password Input, the 1st, 4 Password Input process is relatively slow, the 2nd, 6 Password Input acts phase To very fast.
In actual signal acquisition process, pressed if a number is clicked for a long time, what system acquisition arrived can It can be a string of continuous digital signals, centre is not paused, and this can be processed into and only collect signal of the password figure, The duration that the number for the digital signal occur is pressed as the number key.
Shown in Fig. 2 is the time interval between the two adjacent specific cryptosystem numeral inputs of input or dead time signal Figure, it is assumed that password is 6 bit digitals, and abscissa indicates that the sequence n of Password Input, ordinate indicate time t, it can be seen that Time interval or dead time between 1st to the 2nd and the 3rd to the 4th Password Input is relatively long, figure middle line slope over 10 Larger, the time interval or dead time between the 2nd to the 3rd and the 4th to the 5th Password Input are relatively short, figure middle line Slope over 10 is smaller.Reflect during Password Input, it is close to the 4th to the 2nd password, by the 3rd password by the 1st password The rhythm of the variation of Password Input twice of code is relatively slow, by the 2nd password to the 3rd password, by the 4th password to the 5th The rhythm of password Password Input variation twice is relatively fast.
The finger pressure schematic diagram shown in Fig. 3 that the number key is clicked when being Password Input, is arranged in password figure key Micropressure sensor inputs finger pressure when each password to detect.Assuming that password is 6 bit digitals, abscissa is indicated The sequence n of Password Input, ordinate indicate pressure P, it can be seen that the pressure that number key when the 2nd, 4 Password Input is pressed Power is relatively large, and the pressure that number key when the 6th Password Input is pressed is relatively small, that is, in Password Input process In, the 2nd, the 4th Password Input click action it is relatively heavy, the 6th Password Input click action is relatively light.
It is direct collected user action information during Password Input shown in Fig. 1 ~ 3, further, it is also possible to upper It states acquisition information to be pocessed, by reflecting user action feature compared with special object, including when Password Input, click is pressed Push down the dead time between the duration of the number key and specific duration fiducial value or Password Input and specific pause Time fiducial value or Password Input press one or more combinations in the pressure and specific keys pressure fiducial value of the number key.
The fiducial value includes the mathematical calculations such as difference, ratio, further includes the logical values such as size.
Duration and the Password Input key duration that the key is pressed when for example, inputting a certain password are total and/or average Time interval and adjacent Password Input key interval time between two adjacent specific cryptosystems of the ratio between value or input is total and/or flat The pressure and Password Input pressure of the ratio between mean value or a certain password of input is total and/or the ratio between average value.
For another example, pressed when inputting a certain password the duration of the key with it is adjacent(Upper one or Next Password)Password The ratio between input when key continues or difference or two adjacent Password Inputs between time interval and adjacent password input time Interval(Upper a pair or the adjacent password of lower a pair)The ratio between or difference or input a certain password when pressing click pressure with it is adjacent close Code input(Upper one or Next Password)Pressing click the ratio between pressure or difference.
For another example, it is pressed when the duration of the key continues with a specific cryptosystem input key when inputting a certain password Than or difference or two adjacent Password Inputs between time interval and the ratio between a specific password input time interval or it The ratio between pressure and pressing click pressure of a specific cryptosystem input or difference are clicked in pressing when difference or a certain password of input.
By especially compared with adjacent password, can more preferably reflect during Password Input compared with special object Movement convenient for user's setting, remember oneself with respect to feature or the opposite variation of movement, the relativeness acted using Password Input Motion characteristic.
The present invention by comparison acquisition Password Input action message be with established Password Input action recognition information It is no consistent, judge whether Password Input movement is correct.
Whether the action recognition information for first having to establish Password Input process is correct as the action message for judging acquisition Standard including the acquisition information by Password Input action process under particular state, for example acquires under setup parameter state close Code input action data information, is analyzed through processing, using one group of Password Input action data as Password Input action recognition standard, Or pass through, using statistical result as Password Input movement for statistical analysis to Password Input action message history acquisition data Criterion of identification.
User password input action identification information is established except through statistical method, machine learning or depth can also be passed through Study models Password Input motor habit, for example establishes discriminate depth framework, is judging to pass through use when the error occurs The feedback information at family is corrected, and the accuracy of identification user password input action feature is continuously improved.
The action recognition information of Password Input movement acquisition information and foundation is compared, if Password Input movement acquisition information It is less than given threshold with the difference of the action recognition information of foundation, judges that Password Input movement is correct, otherwise, judge Password Input It acts incorrect.
A kind of control methods is that judgement, all inputs in one group of password of calculating are compared by the movement of whole Password Input Whether the difference of movement acquisition information and the action recognition information of foundation is less than given threshold.With click or pressing code number key Duration for, calculate all Password Input key time durations of acquisition and/or average value held with established key The continuous time and/or average value absolute difference judges movement acquisition information and movement if the difference is less than given threshold Identification information is consistent, and Password Input movement is correct, and otherwise, Password Input movement is incorrect.Further, it is also possible to be by sequence of coden Calculate the exhausted of the difference of established password key duration of each Password Input key time durations and corresponding sequence acquired To value, if all Password Input key time durations difference summations are less than given threshold, judge that Password Input movement is correct, it is no Then, incorrect.
Another control methods is to be compared judgement by the movement of single Password Input, calculates the Password Input with foundation Whether the Password Input movement acquisition information number that action recognition Information Number value difference is less than given threshold is greater than the set value.To click Or for the pressure of pressing code number key, the Password Input key press of acquisition and established corresponding password key pressure are calculated The absolute value of power difference, if the input password number that difference is less than given threshold is greater than the set value, such as at least 2 passwords Input action pressure difference value is less than given threshold, judges the Password Input action message of acquisition and the action recognition information one of foundation It causes, it is otherwise, inconsistent.
Another control methods is compared by the movement of specific Password Input, and the specific cryptosystem includes adjacent close Password such as first password or third position of such as adjacent 3 passwords of 2 passwords or adjacent continuous of code etc., particular order Password etc., the corresponding password in specific data the key position such as corresponding password of numeric keypad diagonal position number or middle position number The corresponding password of word.
It is whether consistent that information Password Input action recognition information corresponding with foundation is acquired by specific cryptosystem input action Judged, for example, the 2nd password figure key pressing duration or key press or the 1st password it is defeated to the 2nd password Time interval or the 2nd password between entering is corresponding with foundation to identify to the time interval etc. between the 3rd Password Input Whether information difference absolute value is less than given threshold.
Further, it is also possible to be acted by the relativeness between specific cryptosystem input action with the corresponding Password Input of foundation Between relativeness consistency judged, such as than the 1st password of the 2nd password figure key pressing duration it is short or Key press is than the 1st big or the 1st password is to than the 2nd password of the time interval between the 2nd Password Input to the 3rd Time interval etc. between Password Input.
Additionally specific cryptosystem can be formed by the way that password is grouped in order, as shown in figure 3, every 3 continuous ciphers It is divided into one group:1st, 2,3 password is the 1st group, and the 2nd, 3,4 password is the 2nd group, and the 3rd, 4,5 password is the 3rd group, the 4th, 5,6 passwords are the 4th group.In group 1, intermediate cryp-tographic key pressure is maximum, and in the 2nd group, intermediate cryp-tographic key pressure is minimum, In 3rd group, intermediate cryp-tographic key pressure is maximum, and in the 4th group, the 1st cryptographic key pressure is maximum.Pass through grouping comparison password figure Key pressure inter-relationship finds out the motion characteristic during Password Input, if there is 2 groups or 2 groups of features above coincide, can sentence Disconnected Password Input movement is correct.
Another control methods is the relativeness of more adjacent Password Input movement, compares adjacent Password Input movement and adopts Whether the relativeness collected in information data relativeness and the Password Input action recognition information of foundation is consistent.For example, comparison Size in the adjacent Password Input key press relative size relationship of acquisition and the Password Input action recognition information of foundation is closed Be it is whether consistent, if the consistent password number of relativeness is greater than the set value, judge acquisition Password Input action message with The action recognition information of foundation is consistent, otherwise, inconsistent.
Above-mentioned control methods be directly with Password Input process movement acquisition information and foundation action recognition information into Row comparison, below method be to be compared and analyzed again after carrying out processing analysis to Password Input action message.
It is a kind of processing analysis method be judge Password Input movement acquire information graphic feature and foundation Password Input Whether the graphic feature of action recognition information is consistent.In Fig. 3, connects the number key during each Password Input and be pressed Power forms pressue-graph, and each number key pressure dependence feature during it can be seen that Password Input in curve is in one " M " type, two peaks, one paddy, distributes alternately, and first wave crest is made of the 1st, 2,3 password key pressure, and first trough is It is made of the 2nd, 3,4 password key pressure, second wave crest is made of the 3rd, 4,5 password key pressure, the figure It is characterized in that two peaks press from both sides a paddy, the position specifically occurred can be different, and the shape of wave crest, trough, i.e. width or height can be different, If figure is identical, judge that Password Input movement is correct.
Shown in Fig. 4 is Password Input key time durations curve graph, and curve is presented two troughs and presss from both sides a wave crest in figure, Each number key during Password Input is pressed time relationship feature in " W " type, and two paddy, one peak distributes alternately, and first A trough is made of the 1st, 2,3,4 password key duration, and first wave crest is held by the 2nd, 3,4,5 password key Continuous time composition, second trough are made of the 4th, 5,6 password key duration, which is characterized in two paddy folder one Peak, the position specifically occurred can be different, and the shape of wave crest, trough, i.e. width or height can be different, if figure is identical, Judge that Password Input movement is correct.
The above-mentioned single judgment method for being merely illustrative graphic feature can combine a variety of graphic features in specific implementation Judged, it is not limited to this.
, variation consistent for Password Input rhythm of action less, or acquires data and normal distribution is presented, can be using statistics Analysis method compares the statistics of the Password Input action message statistical nature of acquisition and the Password Input action recognition information of foundation Whether feature is consistent.
A kind of method of statistical analysis is interval estimation, including mean value, variance etc., is moved by the Password Input of statistics gatherer Make historical data, calculates mean value or variance confidence interval in the case where setting confidence level such as 95%, establish Password Input action recognition Standard is judging Password Input movement just if the mean value or variance of the password action information data of acquisition are fallen in confidence interval Really, otherwise, Password Input movement is incorrect.
Another method of statistical analysis assumes that inspection, including mean value, variance etc., passes through the Password Input of statistics gatherer Historical data is acted, the null hypothesis of the mean value or variance in the case where setting significance such as 5% is carried out, establishes Password Input movement Criterion of identification is examined in receiving area if the mean value or variance of the password action information data of acquisition are in, i.e., difference is not shown It writes, null hypothesis is very, to judge that Password Input movement is correct, examine reject region if be in, that is, there is significant difference, former vacation It is set as false, judges that Password Input movement is incorrect.
The yet another method of statistical analysis is variance analysis, such as least significant difference method, is calculating T inspection statistics After amount, F inspection statistics value is compared with the F distribution critical numerical value under the significance of setting such as 5%, if F examines system Evaluation falls in the receiving area that F distribution critical numerical value defines, and judges that Password Input movement is correct, conversely, Password Input movement is not Correctly.
Whether the present invention is coincide by the encrypted message of verifying acquisition with preset cipher code recognition information, meanwhile, comparison is adopted Whether just whether the Password Input action message of collection and established Password Input action recognition information unanimously judge Password Input Really, judge whether Password Input is correct, password identification method is as shown in figure 5, include the following steps:
(1)Establish the action recognition information of cipher code recognition information and Password Input process;
(2)Acquire the action message of encrypted message and Password Input process;
(3)Whether the encrypted message of verifying acquisition coincide with preset cipher code recognition information, compares the Password Input movement of acquisition Whether information and established Password Input action recognition information are consistent;
(4)If the encrypted message of acquisition and preset cipher code recognition information coincide, meanwhile, the Password Input action message of acquisition It is consistent with established Password Input action recognition information, judge that Password Input is correct, otherwise, judges that Password Input is incorrect.
According to aforementioned password identification method, apparatus for security code recognition of the invention, including number key, processing unit, storage list Member, wherein establish action recognition information, the presetting cipher identification information of Password Input process in the memory unit;Pass through number The action message of key acquisition encrypted message and Password Input process;The encrypted message and preset password of processing unit verifying acquisition Whether identification information coincide, compare acquisition Password Input action message and established Password Input action recognition information whether Unanimously;If the encrypted message and preset cipher code recognition information of acquisition coincide, meanwhile, the Password Input action message of acquisition with Established Password Input action recognition information is consistent, and processing unit judges that Password Input is correct, otherwise, judges Password Input not Correctly.
Further, patch type micropressure sensor is set in the password figure key, is detected when inputting each password Finger pressure, and it is transmitted to processing unit.
The motion characteristic of Password Input because of people, such as men and women click or the pressure weight of pressing code number key not Together, old man is different from the speed speed of young man's Password Input, and the tempo variation during someone's Password Input is obvious, and someone Tempo variation is small.Meanwhile Password Input motion characteristic is also related with relative position of the password on numeric keypad, such as adjacent close Pause or interval time between code input is short, pause between two adjacent Password Inputs diagonal in numeric keypad or when Between be spaced it is long etc..
For Password Input motion characteristic it will be evident that pressure can be clicked by key, duration, inputted in pause One or two of prominent features, such as the motion characteristic or adjacent Password Input relative size logical relation etc. of specific cryptosystem input, it is right Password Input movement carries out identification judgement, identifies error in judgement caused by secondary cause fluctuation to eliminate in user action habit.
It is unconspicuous for Password Input motion characteristic, pressure can be clicked in conjunction with key, duration, inputted in pause Global feature, such as mean value, graphic feature, statistical value etc. carry out comprehensive descision.

Claims (10)

1. a kind of password identification method, feature include the following steps:
Establish the action recognition information of Password Input process;
Acquire the action message of encrypted message and Password Input process;
Whether the encrypted message of verifying acquisition coincide with preset cipher code recognition information, compares the Password Input action message of acquisition It is whether consistent with established Password Input action recognition information;
If the encrypted message and preset cipher code recognition information of acquisition coincide, meanwhile, the Password Input action message of acquisition with Established Password Input action recognition information is consistent, judges that Password Input is correct, otherwise, judges that Password Input is incorrect.
2. method according to claim 1, it is characterized in that:The Password Input action recognition information of establishing includes by specific The acquisition information of Password Input action process is established under state, or the statistics of data is acquired by Password Input action message history Information is established.
3. method according to claim 1, it is characterized in that:Pressing should when the Password Input action message includes Password Input Dead time or Password Input between the duration or Password Input of number key click the pressure value for pressing the number key At least one of.
4. method according to claim 1, it is characterized in that:Pressing should when the Password Input action message includes Password Input Dead time and specific dead time ratio between the duration and specific duration fiducial value or Password Input of number key Compared at least one of pressure and the specific keys pressure fiducial value that value or Password Input press the number key.
5. according to claim 1 or 2 or 3 or 4 the methods, it is characterized in that:The Password Input movement acquisition information and movement Identification information unanimously includes that the difference of the action recognition information of Password Input movement acquisition information and foundation is less than given threshold.
6. method according to claim 5, it is characterized in that:The Password Input movement acquisition information and action recognition information one Cause include and establish action recognition Information Number value difference less than given threshold Password Input movement acquisition number be greater than the set value.
7. method according to claim 5, it is characterized in that:The Password Input movement acquisition information and action recognition information one Cause the movement acquisition information including specific cryptosystem input consistent with action recognition information.
8. according to claim 1 or 2 or 3 or 4 the methods, it is characterized in that:The Password Input movement acquisition information and movement Identification information unanimously includes the figure spy of the graphic feature of the Password Input action message of acquisition and the action recognition information of foundation Sign is consistent.
9. according to claim 1 or 2 or 3 or 4 the methods, it is characterized in that:The Password Input movement acquisition information and movement Identification information unanimously includes the Password Input action message statistical nature of acquisition and the action recognition Information Statistics feature one of foundation It causes.
10. according to claim 1 or 3 the methods, it is characterized in that:Micropressure sensor is set in password figure key, with inspection Survey finger pressure when inputting each password.
CN201810649882.2A 2018-06-22 2018-06-22 Password identification method Pending CN108875426A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810649882.2A CN108875426A (en) 2018-06-22 2018-06-22 Password identification method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810649882.2A CN108875426A (en) 2018-06-22 2018-06-22 Password identification method

Publications (1)

Publication Number Publication Date
CN108875426A true CN108875426A (en) 2018-11-23

Family

ID=64340250

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810649882.2A Pending CN108875426A (en) 2018-06-22 2018-06-22 Password identification method

Country Status (1)

Country Link
CN (1) CN108875426A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110162940A (en) * 2018-12-21 2019-08-23 奇安信安全技术(珠海)有限公司 Account login method and device, electronic equipment and storage medium
CN110324360A (en) * 2019-08-02 2019-10-11 联永智能科技(上海)有限公司 Offline cryptogram setting, management method, device, system, server and medium
CN111339506A (en) * 2020-02-21 2020-06-26 安徽斯跑特科技有限公司 Customer management platform for sale of trusted operating system

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110162940A (en) * 2018-12-21 2019-08-23 奇安信安全技术(珠海)有限公司 Account login method and device, electronic equipment and storage medium
CN110324360A (en) * 2019-08-02 2019-10-11 联永智能科技(上海)有限公司 Offline cryptogram setting, management method, device, system, server and medium
CN111339506A (en) * 2020-02-21 2020-06-26 安徽斯跑特科技有限公司 Customer management platform for sale of trusted operating system

Similar Documents

Publication Publication Date Title
CN106911668B (en) Identity authentication method and system based on user behavior model
CN104809377B (en) Network user identity monitoring method based on webpage input behavior feature
CN104239761B (en) The identity for sliding behavioural characteristic based on touch screen continues authentication method
CN106548343B (en) Illegal transaction detection method and device
CN111163087B (en) Database safety protection system based on data acquisition
US8489635B1 (en) Method and system of identifying users based upon free text keystroke patterns
CN108875426A (en) Password identification method
CN112987675A (en) Method, device, computer equipment and medium for anomaly detection
CN111654496B (en) Safety monitoring and protection system for industrial internet platform system
CN109583161B (en) Information processing method and device and storage medium
CN111625792B (en) Identity recognition method based on abnormal behavior detection
CN107770168A (en) Low rate of false alarm IDS/IPS based on attack chain markov decision process
CN106792883A (en) Sensor network abnormal deviation data examination method and system
CN204791050U (en) Authentication equipment
CN110544168A (en) weak supervision internet financial anti-fraud method based on generation countermeasure network
CN109871673A (en) Based on the lasting identity identifying method and system in different context environmentals
CN110493142A (en) Mobile applications Activity recognition method based on spectral clustering and random forests algorithm
CN107273728B (en) Smart watch unlocking and authentication method based on motion sensing behavior characteristics
CN117992953A (en) Abnormal user behavior identification method based on operation behavior tracking
CN112787984A (en) Vehicle-mounted network anomaly detection method and system based on correlation analysis
Cui et al. Multifractal characterization of distribution synchrophasors for cybersecurity defense of smart grids
CN116383786B (en) Big data information supervision system and method based on Internet of things
CN113343946A (en) Cross-connection cabinet based on Internet of things and control system and control method thereof
CN107862200A (en) Cipher-code input method and device
CN116523722A (en) Environment monitoring analysis system with machine learning capability

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20181123