User identification through keystroke

Post on 18-Nov-2014

1.576 views 4 download

description

 

Transcript of User identification through keystroke

User Identification Through “Key-Stroke Biometrics”

Objectives… What is Biometrics? What are the different types of

Biometrics? Key-Stroke Biometric

What is it? How it works? Analysis of inter-keystroke timing of user code Benefits Advantages Disadvantages

Conclusion

User Identification Approaches

Biometric…

Physiological Characteristics

Fingerprints

Iris

Facial

Blood vessel/vein pattern

Behavioral characteristics

Key-Stroke Biometric… What is it…??

Key-Stroke (Dynamics) Biometrics

Main (){ If (user = = new) { //register the user //add the user to the database Obtain the password Add user (database); } else { read (user); read (deviation); if (usercount>=15 && usercount<=20)

{ add userpass (database);}

else{

read (deviation);}

if (check (user, password, deviation)){ login;}

else exit(0); }}

Data Capture

Analysis of inter-keystroke timing of user code

Analysis of inter-keystroke timing of user code

Benefits… Provision for adjusting FRR/FAR. It continuously captures the

rhythm of typing till the end.

Advantages… Software Only method. (No Additional Hardware except a Keyboard) Simple To Deploy and Use (username & passwords) – Universally

accepted Cost Effective No End-User Training Computer security Less space

Disadvantages… Typing patterns can be rather erratic. Inconsistent. Difficult when authorized user is

injured. Typing pattern vary based on the

type of the key-board being used, the key-board layout (i.e. qwerty pad).

Conclusion… It seems promising , still needs more efforts

specially for identification As the security mechanism is not visible,

unauthorized users can’t have an idea of the security measure.

Keystroke biometrics is a fool proof security solution.

It is quickly emerging as a viable, low cost, non-intrusive alternative to traditional biometric technologies.

Thank You…