英语 英语 日语 日语 韩语 韩语 法语 法语 德语 德语 西班牙语 西班牙语 意大利语 意大利语 阿拉伯语 阿拉伯语 葡萄牙语 葡萄牙语 越南语 越南语 俄语 俄语 芬兰语 芬兰语 泰语 泰语 泰语 丹麦语 泰语 对外汉语

8-11 我认识你吗?

时间:2006-10-17 16:00来源:互联网 提供网友:toad   字体: [ ]
特别声明:本栏目内容均从网络收集或者网友提供,供仅参考试用,我们无法保证内容完整和正确。如果资料损害了您的权益,请与站长联系,我们将及时删除并致以歉意。
    (单词翻译:双击或拖选)

Do I Know You?

 

With computer security threats lurking1 around every electronic corner it is no wonder that so many online activities, from signing into your e-mail to checking your bank account, require a secure log-in with a password. But passwords can be stolen or forgotten, and most of us are not about to shell out1 for a high-tech2 retinal2 scanner3. So Israeli scientists in Haifa4 have created a program that lets a computer recognize you as its rightful user based simply on the way you type.

 

The human brains behind this artificial brain are two undergraduate students. They came up with the idea of a program that recognizes users by their keystrokes and took it to a professor of computer science. The professor and other scientists realized that any standard computer already monitors the time it takes a user to press and release a key. Their innovation was to create a program that records the details of keystroke timing3 and turns them into a distinctive45 user profile. Variables such as the length of your fingers, the size of your hands, your fine motor skills, your knowledge of the keyboard, and your fluency5 in the language being typed all affect your keystroke rate and pattern and define your rhythm on the keyboard as uniquely your own.

 

If the person working on the computer fits your profile, the program will signal a positive ID; if the program senses a mismatch, it could be used to block access to sensitive files. The great appeal of this security system is that it does not require the user to do anything out of the ordinary. You go about business as usual while the computer does all the work. “One can obviously deliberately66 type in a way that differs from how one normally would, but it’s really very hard to type like somebody else,” the scientists say. “This program picks out superimposed7 patterns unique to an individual user.”

 

The researchers tested the program by allowing five authorized78 users to type simple sentences, permitting the system to learn their typing habits. They then asked the five authorized users and 30 mock9 attackers to type out answers to simple open? ended questions such as “ What did you do today?” as well as a specific letter sequence: “To be or not to be. That is the question.” Both groups were then allowed to type whatever they wished. Within a few minutes of typing, the program had collected enough data to recognize authorized users 95 percent of the time and to block attackers in 99 percent of the test sessions.

 

This security system can also be equipped with an alert function to notify the authorized user when an attacker attempts to get access to his or her account. The scientists are also working on a companion program that would recognize patterns in computer mouse usage, which could prevent a stranger from clicking on folders8 to view sensitive files. In fact, there’s no reason why this approach must be limited to computers. The more complex the interaction, the easier it is for the system to identify someone because the variability is so great. The scientists aim to develop a program that allows a car to recognize its owner based on characteristic patterns of braking10, accelerating11, signaling, turning, and other essential driving actions.

 

注释:

1. shell out  (),付()

2. retinal [`retInEl] a.  视网膜的,视网膜上的

3. scanner [5skAnE] n.  扫描设备

4. Haifa [5haifE] 海法 [以色列港市]

5. distinctive [dis5tiNktiv] a.  特别的,有特色的

6. deliberately [dI5lIbErEtlI] ad.  故意地,蓄意地

7. superimposed [7sju:pErim5pEuzd] a.  叠置的,重叠的,附加上的

8. authorized [5C:WEraIzd] a.  经授权的,经委托的

9. mock [mCk] a.  假的,假装的

10. brake [breik] vi.  刹车

11. accelerate [Ak5selEreit] vi.  加速,增速

 

我认识你吗?

 

在计算机和网络的世界里,对于安全的威胁几乎无处不在。难怪那么多的在线活动都要求输入密码进行安全登录,从进入你的电子邮箱到检查你的银行账户。但是密码可以被窃或者被遗忘,而多数人还没有做好为高技术的视网膜扫描仪花一大笔钱的准备。所以,以色列海法市的科学家开发了一个程序,使计算机只需仅仅根据你的打字方式就能识别你是否是合法用户。

这个人工智能程序的发明者是两个本科学生。他们开发出一个根据键盘击键模式识别使用者的程序,并把它拿去给一位计算机科学教授看。教授和同行科学家知道,所有标准配置的计算机在用户敲击键盘时已经对其同时进行了监控。他们的发明是编写一个程序,记录下键盘输入的时间细节,并将其转换成个人特有的用户档案。各种变量,诸如你手指的长度、手的大小、细微的指法特点、键盘知识以及对输入语言的熟练程度,都会影响你的键入速度、模式,并决定你独有的输入节奏。

如果一个人的电脑操作习惯符合你的档案资料,那么程序就会发出一个信号表明身份验证已获通过;如果程序判断出不相符合,它就会阻止这个人接触你的机密文档。这个安全系统一个很大的诱人之处在于,它不要求使用者多做任何操作。你就像平常一样工作,而计算机会完成它该干的识别工作。“一个人显然可以故意改变他一贯的键入方式,但是想要模仿其他人的键入方式却是非常困难的,”科学家们说。“这个程序辨识并储存特定使用者所特有的键入模式,(并将其与每一位使用者的键入模式相比较,以确定是否相符。)”

研究人员对程序进行了测试。他们准许5名授权使用者键入简单的句子,让系统了解他们的键入习惯;然后请5名授权使用者和30个模拟攻击者键入一些简单开放式问题(如“你今天做了些什么事情?”)的答案,并让他们键入一指定的句子——“生还是死,问题就在这里。”两组测试者随后被允许任意键入他们想要输入的内容。在键盘操作的短短几分钟内,识别程序已收集到足够数据,能够识别授权使用者和阻截攻击者,准确率分别达到95%和99%。

这个安全系统还可以配备报警功能。当攻击者试图进入授权使用者的账户时,该功能将向其发出通知。科学家们还在开发一个伴侣程序,用来识别计算机鼠标操作模式,以防止陌生人通过点击文件夹看到机密文档。实际上,这种识别程序的原理应当不仅仅只局限于计算机。由于变量如此之大,因此,人和机器的相互作用越复杂,系统就越容易识别用户。科学家有志于开发一个程序,使汽车能够根据刹车、加速、指示灯操作、转弯以及其他的基本驾驶风格来识别自己的主人。


点击收听单词发音收听单词发音  

1 lurking 332fb85b4d0f64d0e0d1ef0d34ebcbe7     
潜在
参考例句:
  • Why are you lurking around outside my house? 你在我房子外面鬼鬼祟祟的,想干什么?
  • There is a suspicious man lurking in the shadows. 有一可疑的人躲在阴暗中。 来自《现代英汉综合大词典》
2 high-tech high-tech     
adj.高科技的
参考例句:
  • The economy is in the upswing which makes high-tech services in more demand too.经济在蓬勃发展,这就使对高科技服务的需求量也在加大。
  • The quest of a cure for disease with high-tech has never ceased. 人们希望运用高科技治疗疾病的追求从未停止过。
3 timing rgUzGC     
n.时间安排,时间选择
参考例句:
  • The timing of the meeting is not convenient.会议的时间安排不合适。
  • The timing of our statement is very opportune.我们发表声明选择的时机很恰当。
4 distinctive Es5xr     
adj.特别的,有特色的,与众不同的
参考例句:
  • She has a very distinctive way of walking.她走路的样子与别人很不相同。
  • This bird has several distinctive features.这个鸟具有几种突出的特征。
5 fluency ajCxF     
n.流畅,雄辩,善辩
参考例句:
  • More practice will make you speak with greater fluency.多练习就可以使你的口语更流利。
  • Some young children achieve great fluency in their reading.一些孩子小小年纪阅读已经非常流畅。
6 deliberately Gulzvq     
adv.审慎地;蓄意地;故意地
参考例句:
  • The girl gave the show away deliberately.女孩故意泄露秘密。
  • They deliberately shifted off the argument.他们故意回避这个论点。
7 authorized jyLzgx     
a.委任的,许可的
参考例句:
  • An administrative order is valid if authorized by a statute.如果一个行政命令得到一个法规的认可那么这个命令就是有效的。
8 folders 7cb31435da1bef1e450754ff725b0fdd     
n.文件夹( folder的名词复数 );纸夹;(某些计算机系统中的)文件夹;页面叠
参考例句:
  • Encrypt and compress individual files and folders. The program is compact, efficient and user friendly. 加密和压缩的个人档案和folders.the计划是紧凑,高效和用户友好。 来自互联网
  • By insertion of photocopies,all folders can be maintained complete with little extra effort. 插入它的复制本,不费多大力量就能使所有文件夹保持完整。 来自辞典例句
本文本内容来源于互联网抓取和网友提交,仅供参考,部分栏目没有内容,如果您有更合适的内容,欢迎点击提交分享给大家。
------分隔线----------------------------
TAG标签:   英语沙龙  认识  英语沙龙  认识
顶一下
(0)
0%
踩一下
(0)
0%
最新评论 查看所有评论
发表评论 查看所有评论
请自觉遵守互联网相关的政策法规,严禁发布色情、暴力、反动的言论。
评价:
表情:
验证码:
听力搜索
推荐频道
论坛新贴