EssaysForStudent.com - Free Essays, Term Papers & Book Notes
Search

User Authentication Through Typing Patterns

By:   •  Essay  •  320 Words  •  December 27, 2009  •  912 Views

Page 1 of 2

Join now to read essay User Authentication Through Typing Patterns

USER AUTHENTICATION THROUGH TYPING PATTERNS

ABSTRACT

The argument surrounding this research topic is that the use of keystroke rhythm is a natural choice for computer security. This argument stems from observations that similar neuro-physiological factors that make written signatures unique are also exhibited in a user’s typing pattern. The keystroke dynamics of a computer user’s login string provide a characteristic pattern that can be used for verification of the user’s identity. Keystroke patterns combined with other security schemes can provide a very powerful and effective means of authentication and verification of computer users. Keystroke dynamics are rich with individual mannerism and traits and they can be used to extract features that can be used to authenticate/verify access to computer systems and networks. The methods used to prove the theory that typing patterns can be used as a means of verification is the many scholarly articles and findings of individuals that have taken an interest in this method of identification. Through these findings we are able to understand the pitfalls and work on implementing this form of identification.

INTRODUCTION

There are a multitude of biometric techniques either widely

Download as (for upgraded members)  txt (2.1 Kb)   pdf (55.3 Kb)   docx (10.6 Kb)  
Continue for 1 more page »