keystroke authentication it’s all in how you type john c. checco biometritech 2003 biochec™

12
Keystroke Authentication It’s All in How You Type John C. Checco BiometriTech 2003 bioChec™

Upload: meredith-conley

Post on 04-Jan-2016

218 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Keystroke Authentication It’s All in How You Type John C. Checco BiometriTech 2003 bioChec™

Keystroke AuthenticationIt’s All in How You Type

John C. CheccoBiometriTech 2003

bioChec™

Page 2: Keystroke Authentication It’s All in How You Type John C. Checco BiometriTech 2003 bioChec™

Overview

What is Keystroke Authentication

How Effective is Keystroke Authentication

Advantages of Keystroke Authentication

Markets for Keystroke Authentication

Future for Keystroke Authentication

Page 3: Keystroke Authentication It’s All in How You Type John C. Checco BiometriTech 2003 bioChec™

What is Keystroke Authentication

Biological Measurements Measurement of physical aspects of a person that determine identity Static measurement

ڤ Absolute match Quality of measurement is only variable by the quality of the capture device. Examples:

ڤ DNA, ڤ Iris/Retina Scan, ڤ Fingerprint, ڤ Hand Geometry …

Behavioral Measurements Measurement of characteristic traits exhibited by a person that can determine

identity Dynamic measurement

ڤ Confidence match Quality of measurement varies by behavioral and other external factors. Examples:

ڤ Keystroke Heuristics, ڤ Handwriting Analysis, ڤ Voice Verification …

Page 4: Keystroke Authentication It’s All in How You Type John C. Checco BiometriTech 2003 bioChec™

What is Keystroke Authentication

Keystroke Heuristics / Keystroke Dynamics

Pattern exhibited by a person using an input device in a consistent manner

Keyboard, Keypad, Stylusڤ.Relies on spatial configuration, timing, cadence, and contentڤ

Measurements captured are already available by the input device:Dwell timeڤFlight timeڤAbsolute versus Relative timingڤ

Processing consists of deducing a series of key factors from an arbitrary data stream:

Robotic vision, Economic trending, Quantum physicsڤ.Being consistent as well as consistently inconsistentڤ

Page 5: Keystroke Authentication It’s All in How You Type John C. Checco BiometriTech 2003 bioChec™

What is Keystroke Authentication

History of the World, Part I 1979:

.Technology originally developed by SRI Internationalڤ

1984: National Bureau of Standards (NBS) study concluded that computerڤ

keystroke authentication of 98% accuracy.

1988: Keystroke authentication hardware device passes NIST Computerڤ

Security Act of 1987.

2000: Keystroke authentication passes the Financial Services Technologyڤ

Consortium (FSTC) / International Biometric Group (IBG) Comparative Testing program.

Patents (partial list):5056141 ,4998279 ,4962530 ,4805222 ,5557686 ,4621344ڤ

Page 6: Keystroke Authentication It’s All in How You Type John C. Checco BiometriTech 2003 bioChec™

How Effective is Keystroke Authentication

Fingerprint FAR= ~0% FRR= ~1%

Keystroke Heuristics FAR = ~0.01% FRR = ~3.0%

Manufacturer recommended settingsڤVariable (application-defined)ڤ

Facial Recognition FAR/FRR vary according to: compression, distance, illumination,

media, pose, resolution, and other temporal factors.

Voice Recognition FAR = ~1.6% FRR = ~8.1%

Page 7: Keystroke Authentication It’s All in How You Type John C. Checco BiometriTech 2003 bioChec™

How Effective is Keystroke Authentication

What If …. I injure my hand?

?How many people have you met that have had hand injuriesڤ?How many people have you met that forgot their passwordڤ

I enrolled on one keyboard and want to login on another?Tactile versus membraneڤFull-size versus compactڤKey-character layoutڤ

My connection is hijacked and someone replays my keystrokes?

.Fraud detection methods vary by manufacturerڤ

I have a bad day?

Page 8: Keystroke Authentication It’s All in How You Type John C. Checco BiometriTech 2003 bioChec™

Advantages of Keystroke Authentication

Deployment / Maintenance: No physical hardware to install or maintain. No manpower needed on client-side deployment for installations or upgrades.

Technical: Inherently narrows the identification pool to achieve authentication FAR/FRR.

Portable: Users are not limited to individual or specific workstations. Can support remote access and telecommuting

Adjustable: Application and/or user managed levels of security. Can constantly adjust/refine a user’s biometric template over time.

Breadth: Software-only components allow integration into any software project.

User Acceptance: Non-invasive capture Can support invisible (background) enrollment. Works better with phrases familiar (easy to remember) for the user.

Page 9: Keystroke Authentication It’s All in How You Type John C. Checco BiometriTech 2003 bioChec™

Markets for Keystroke Authentication

Network Security: Integration with Single Sign-on Solutions. RADIUS integration Integration into terminal access applications. Integration into NTFS Volume Protection. Promote proper use of existing licensing. Logging of biometric access creates better forensic evidence.

Personal Information Security: Primary authorization for individual document encryption. Secondary authorization mechanism for online purchases.

Asset Identification: Integration with Online Training/Testing. Document signing (e.g. HIPAA) Software Licensing and Registration.

Page 10: Keystroke Authentication It’s All in How You Type John C. Checco BiometriTech 2003 bioChec™

Future for Keystroke Authentication

Consumer Market:

ATM PDA RIM Cell phones Home Security Access Pads

Page 11: Keystroke Authentication It’s All in How You Type John C. Checco BiometriTech 2003 bioChec™

Questions and Comments

Notes:

Page 12: Keystroke Authentication It’s All in How You Type John C. Checco BiometriTech 2003 bioChec™

Contact Information

John C. CheccoPresident, bioChec™Checco Services, Inc.

[email protected]