CONTINUOUS IDENTITY AUTHENTICATION METHOD FOR COMPUTER USERS
First Claim
1. A continuous identity authentication method for computer users, used for verifying the identity of a user of a computer system, comprising the following steps of:
- continuously recording the usage behavior of the computer system and generating a user'"'"'s behavioral data with a background program after the user is logged into the computer system;
storing the user'"'"'s behavioral data in a user behavior database;
converting the user'"'"'s behavioral data of a preset learning time into a group of articles with a first conversion program;
creating a user'"'"'s behavioral model from the group of articles with a second conversion program;
comparing the user'"'"'s behavioral data recorded by the background program with the user'"'"'s behavioral model at a preset time interval after the user'"'"'s behavioral model is created;
if the similarity between the user'"'"'s behavioral data and the user'"'"'s behavioral model is below a preset threshold, the situation is determined to be an abnormal event; and
temporarily locking the computer system and executing a revalidation process when an abnormal event occurs.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention provides a continuous identity authentication method. This method transforms the behavior records of different time intervals of the system user into a text format, and uses a resampling technique to generate a large number of articles of different lengths in order to have behavior records of the system user in different lengths of time, then using a document classification technique to build a matrix. In the end, building behavioral models of different time periods of the system'"'"'s user using Minimum Enclosing Ball technology. The behavioral models can then learn the behavior of the legitimate system user and continuously check whether the system is currently operated by the legitimate system user or not.
-
Citations
10 Claims
-
1. A continuous identity authentication method for computer users, used for verifying the identity of a user of a computer system, comprising the following steps of:
-
continuously recording the usage behavior of the computer system and generating a user'"'"'s behavioral data with a background program after the user is logged into the computer system; storing the user'"'"'s behavioral data in a user behavior database; converting the user'"'"'s behavioral data of a preset learning time into a group of articles with a first conversion program; creating a user'"'"'s behavioral model from the group of articles with a second conversion program; comparing the user'"'"'s behavioral data recorded by the background program with the user'"'"'s behavioral model at a preset time interval after the user'"'"'s behavioral model is created; if the similarity between the user'"'"'s behavioral data and the user'"'"'s behavioral model is below a preset threshold, the situation is determined to be an abnormal event; and temporarily locking the computer system and executing a revalidation process when an abnormal event occurs. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
Specification