User Identification Through “Key-Stroke Biometrics”
Objectives… What is Biometrics? What are the different types of
Biometrics? Key-Stroke Biometric
What is it? How it works? Analysis of inter-keystroke timing of user code Benefits Advantages Disadvantages
Conclusion
User Identification Approaches
Biometric…
Physiological Characteristics
Fingerprints
Iris
Facial
Blood vessel/vein pattern
Behavioral characteristics
Key-Stroke Biometric… What is it…??
Key-Stroke (Dynamics) Biometrics
Main (){ If (user = = new) { //register the user //add the user to the database Obtain the password Add user (database); } else { read (user); read (deviation); if (usercount>=15 && usercount<=20)
{ add userpass (database);}
else{
read (deviation);}
if (check (user, password, deviation)){ login;}
else exit(0); }}
Data Capture
Analysis of inter-keystroke timing of user code
Analysis of inter-keystroke timing of user code
Benefits… Provision for adjusting FRR/FAR. It continuously captures the
rhythm of typing till the end.
Advantages… Software Only method. (No Additional Hardware except a Keyboard) Simple To Deploy and Use (username & passwords) – Universally
accepted Cost Effective No End-User Training Computer security Less space
Disadvantages… Typing patterns can be rather erratic. Inconsistent. Difficult when authorized user is
injured. Typing pattern vary based on the
type of the key-board being used, the key-board layout (i.e. qwerty pad).
Conclusion… It seems promising , still needs more efforts
specially for identification As the security mechanism is not visible,
unauthorized users can’t have an idea of the security measure.
Keystroke biometrics is a fool proof security solution.
It is quickly emerging as a viable, low cost, non-intrusive alternative to traditional biometric technologies.
Thank You…