user identification through keystroke

18
User Identification Through “Key-Stroke Biometrics”

Upload: vani011

Post on 18-Nov-2014

1.585 views

Category:

Documents


4 download

DESCRIPTION

 

TRANSCRIPT

Page 1: User identification through keystroke

User Identification Through “Key-Stroke Biometrics”

Page 2: User identification through keystroke

Objectives… What is Biometrics? What are the different types of

Biometrics? Key-Stroke Biometric

What is it? How it works? Analysis of inter-keystroke timing of user code Benefits Advantages Disadvantages

Conclusion

Page 3: User identification through keystroke

User Identification Approaches

Page 4: User identification through keystroke

Biometric…

Page 5: User identification through keystroke

Physiological Characteristics

Fingerprints

Iris

Facial

Blood vessel/vein pattern

Page 6: User identification through keystroke

Behavioral characteristics

Page 7: User identification through keystroke

Key-Stroke Biometric… What is it…??

Page 8: User identification through keystroke

Key-Stroke (Dynamics) Biometrics

Page 9: User identification through keystroke

Main (){ If (user = = new) { //register the user //add the user to the database Obtain the password Add user (database); } else { read (user); read (deviation); if (usercount>=15 && usercount<=20)

{ add userpass (database);}

else{

read (deviation);}

if (check (user, password, deviation)){ login;}

else exit(0); }}

Page 10: User identification through keystroke
Page 11: User identification through keystroke

Data Capture

Page 12: User identification through keystroke

Analysis of inter-keystroke timing of user code

Page 13: User identification through keystroke

Analysis of inter-keystroke timing of user code

Page 14: User identification through keystroke

Benefits… Provision for adjusting FRR/FAR. It continuously captures the

rhythm of typing till the end.

Page 15: User identification through keystroke

Advantages… Software Only method. (No Additional Hardware except a Keyboard) Simple To Deploy and Use (username & passwords) – Universally

accepted Cost Effective No End-User Training Computer security Less space

Page 16: User identification through keystroke

Disadvantages… Typing patterns can be rather erratic. Inconsistent. Difficult when authorized user is

injured. Typing pattern vary based on the

type of the key-board being used, the key-board layout (i.e. qwerty pad).

Page 17: User identification through keystroke

Conclusion… It seems promising , still needs more efforts

specially for identification As the security mechanism is not visible,

unauthorized users can’t have an idea of the security measure.

Keystroke biometrics is a fool proof security solution.

It is quickly emerging as a viable, low cost, non-intrusive alternative to traditional biometric technologies.

Page 18: User identification through keystroke

Thank You…