期刊文献+

基于击键韵律的口令鉴别增强系统研究

Research on enhanced password authentication system based on keystroke rhythm
在线阅读 下载PDF
导出
摘要 击键韵律是以人的行为特征为基础的身份认证技术。文章对PR-RP算法模型进行分析,参照PR-RP模型中四个关键的数据集,重新构建P-P时延数据集和R-R时延数据集。然后,在电话收音机业务平台的基础上,通过UML对需求进行详细分析,绘制分析类的行为顺序图。最后,基于重构的PR-RP模型设计较为灵活的口令鉴别增强系统。该系统充分考虑功能和安全方面的要求,可以无缝嵌入到实际商用系统中。 Keystroke rhythm is an identity authentication technique which takes persons behaviour characteristics as the basis. The PR-RP model is analyzed, in which four critical dataset are chosen, P-P and R-R relay dataset are rebuilt and processed. And then, the telephone radio set business platform's request is analyzed by means of UML The act sequence sketches of the analysis classes are completed. Finally, Password authentication system has designed based on the restructuring PR-RP model. The system has fully considered the request about function and security and may seamlessly insert to the actual commercial system.
作者 孙逢林
机构地区 中南大学商学院
出处 《长沙通信职业技术学院学报》 2011年第4期5-9,共5页 Journal of Changsha Telecommunications and Technology Vocational College
关键词 击键韵律 PR—RP模型 登录 用户身份识别 keystroke rhythm PR-RP model login subscriber identity
  • 相关文献

参考文献8

  • 1Giot R, El-Abed M, Rosenberger C. GREYC keystroke: A benchmark for keystroke dynamics biometric systems[A]. Biometrics: Theory, Applications, and Systems: BTAS "09. IEEE 3rd International Conference{C].2009.1--6.
  • 2ULUDAG U,PANKANTI S,PRABHAKAR S,et al.Biometric Cryptosystems: Issues and Challenges[A] . Pmc of IEE- Conference on Multimedia Information Retrieval[C]. IEEE Press,2004.
  • 3Malinka,K.Usability of Visual Evoked Potentials as Behavioral Characteristics for Biometrie Authentication : Internet Monitoring and Protection[A]. ICIMP'09. Fourth International Conference [ C ]. 2009.84- 89.
  • 4SUTCU Y,QIMING L, MEMON N.Protecting Biometric Templates with Sketch:Theory and Practice[J].lEEE Transactions on Information Forensics and Security, 2007,2(3):503-512.
  • 5Hemav C R, Paulraj M P,Kaur H.Brain signatures: A modality for biometric authentication[A]. Electronic Design, 2008. ICED 2008. International Conference[C].2008.1--4.
  • 6Kacholia V, Pandit S. Biometric Authentication Using Random Distributions[A]. Proceedings of the ISth Canadian IT Security Symposium[C].Ottawa,Canada,2003.1-8.
  • 7傅霞玲.基于客户/服务器程序的数据完整性约束[J].武汉科技学院学报,2008,21(11):13-15. 被引量:1
  • 8Dong Xu,Huaikou Miao,Philbert N. Model Checking UML Activity Diagrams in FDR[A]. Computer and Information Science, 2009. ICIS 2009. Eighth IEEE/ACIS International Conference[C].2009.1035-1040.

二级参考文献11

  • 1李昭原.数据库技术新发展[M].清华大学出版社,1997..
  • 2[美]JeffreyD.Ullman,JenniferWidom著.史嘉权等译,数据库系统基础教程.清华大学出版社,1999.
  • 3基于Client/Server数据完整性约束的实现,载自www.solw.cn,2007.
  • 4FERRAIOLODF,GILBERTDM,LYNCHN.An examination offederal and commercial access control policy needs[A].Proceedings ofthe 16^th National Computer Security Conference [C]. Baltimore, MaryLand:NISTNCS C, 1993:107116.
  • 5SANDHURS,COYNEEJ,FEINSTEINHL, etc.Role-based accesscontrol models[J].IEEE Computer, 1996,29(2):3847.
  • 6FERRAIOLODF,SANDHURS,GAVRILAS, etc.A proposed standard for role-based access control[J].ACM Transaction on Information and System Security,2001,4(3):224274.
  • 7OSBORN S,SANDHURS,MUNAWERQ.Configuring rolebased access control to enforce mandatory and discretionary access control policies [J].ACM Transaction on Information and System Security, 2000, 3 (2):85106.
  • 8AHN G J,SANDHURS.Role-based authorization constraints speciflcation[J].ACM Transaction on Information and System Security, 2000, 3(4): 207226
  • 9FERRAIOLODF,KUHNR,Role based access controls[A]. 15thNIST NCSC National Computer Security Conference[C].Baltimore, MaryLand: NIST2NCSC, 1992:554563.
  • 10周龙镶.数据库管理系统实现技术.中国地质大学出版社,1990:69

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部