New Interaction Techniques Department of Computer Sciences University of Tampere, Finland September – December, 2003 Grigori Evreinov www.cs.uta.fi/~grse/

Slides:



Advertisements
Similar presentations
Touch-Screen Mobile- Device Data Collection for Biometrics Studies W. Ciaurro, B. Major, D. Martinez, D. Panchal, G. Perez, M. Rana, R. Rana, R. Reyes,
Advertisements

Chapter 5 p. 6 What Is Input? What is input? p. 230 and 232 Fig. 5-1 Next  Input device is any hardware component used to enter data.
DESCRIBING INPUT DEVICES
Chapter 5 Input and Output. What Is Input? What is input? p. 166 Fig. 5-1 Next  Input device is any hardware component used to enter data or instructions.
Detecting Computer Intrusions Using Behavioral Biometrics Ahmed Awad E. A, and Issa Traore University of Victoria PST’05 Oct 13,2005.
By: Monika Achury and Shuchita Singh
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Modeling an Intelligent Continuous Authentication System to Protect Financial Information Resources Thomas G. Calderon Akhilesh Chandra John J. Cheh The.
Chapter 12: Authentication Basics Passwords Challenge-Response Biometrics Location Multiple Methods Computer Security: Art and Science © Matt.
FIT3105 Smart card based authentication and identity management Lecture 4.
New Interaction Techniques Department of Computer Sciences University of Tampere, Finland September – December, 2003 Grigori Evreinov
TAUCHI – Tampere Unit for Computer-Human Interaction Manual Text Entry: Experiments, Models, and Systems Poika Isokoski Tampere Unit for Computer-Human.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
VB6.0 New Interaction Techniques Department of Computer Sciences University of Tampere, Finland September – December, 2003 Grigori Evreinov
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Text Input Under Time Pressure Conditions Department of Computer and Information Sciences University of Tampere, Finland Liang Jing Liang Jing p 01_12.
Biometrics and Authentication Shivani Kirubanandan.
Keystroke Dynamics Jarmo Ilonen. Structure of presentation Introduction Keystroke dynamics for Verification Identification Commercial system: BioPassword.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Biometrics: Identity Verification in a Networked World
Your Interactive Guide to the Digital World Discovering Computers 2012.
Marjie Rodrigues
Security-Authentication
1 Introduction to Computers Day 2. 2 Input Devices Input devices are used to feed data and instructions to the computer systems.They consist of a range.
CHAPTER 2 Input & Output Prepared by: Mrs.sara salih 1.
Muhammad Tehseen Qureshi.  What is input?  Input device is any hardware component that allows users to enter data and instructions  Data or instructions.
Biometrics: Ear Recognition
Chapter 5 Input. What Is Input? What are the input devices? Input device is any hardware component used to enter data or instructions Data or instructions.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
Authentication Approaches over Internet Jia Li
INPUT DEVICES. KEYBOARD Most common input device for a computer.
Information Security for Managers (Master MIS)
The solution is at your fingertips!. BARTEX 2000 Corp. BARTEX brings You integrated security solutions using the most advanced technology available in.
B IOMETRIC STANDARDS A N OVERVIEW OF BIOMETRICS AND IDENTITY MANAGEMENT Supervisor : Ahmed Abu Mosameh Prepared by samaher el nbahen UNIVERSITY.
Introduction to Biometrics Charles Tappert Seidenberg School of CSIS, Pace University.
Chapter-2 Identification & Authentication. Introduction  To secure a network the first step is to avoid unauthorized access to the network.  This can.
Keystroke Dynamics Etem DENİZ, Buğra KOCATÜRK, Gülşah YILDIZOĞLU, Ömer UZUN Boğaziçi University, CMPE, May 2010.
BY CHEN YEAH TECK Image-Based Authentication for Mobile Phones: Performance and User Opinions Source: Slippery Brick (2006)
Entity Authentication
Le Trong Ngoc Security Fundamentals Entity Authentication Mechanisms 4/2011.
User Authentication Using Keystroke Dynamics Jeff Hieb & Kunal Pharas ECE 614 Spring 2005 University of Louisville.
Three Basic Identification Methods of password Possession (“something I have”) Possession (“something I have”) Keys Passport Smart Card Knowledge (“Something.
Selim Akyokus AIA /2/ AIA 2007 ENHANCED PASSWORD AUTENTICATION THROUGH KEYSTROKE TYPING CHARACTERISTICS Ozlem Guven(1), Selim Akyokus(1),
1.The Nature, Impact and Issues of Information Technology 1.6Strategies used to Prevent Deliberate and Accidental Illegal Actions.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Keystroke Authentication It’s All in How You Type John C. Checco BiometriTech 2003 bioChec™
Biometrics Authentication Technology
I can be You: Questioning the use of Keystroke Dynamics as Biometrics —Paper by Tey Chee Meng, Payas Gupta, Debin Gao Presented by: Kai Li Department of.
Pertemuan #9 Security in Practice Kuliah Pengaman Jaringan.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Biometric Technologies
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
L. F. Coppenrath & Associates PASSWORD BIOPASSWORD ® Biometric Keystroke Dynamics Technology Overview.
INPUT AND OUTPUT DEVICES Group: 10 Batch: TIS 76 Gaby Alexander Damini Mangaj Amritpreet Singh Arunavathi Suraj Medda.
Keystroke Dynamics By Hafez Barghouthi.
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Topic 2 Input devices. Topic 2 Input devices Are used to get raw data into the computer so that it can be processed Include common input devices such.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
An Introduction to Biometrics
TING-YI CHANG ( 張庭毅 ) Phone: EXT 7381 GRADUATE INSTITUTE OF E-LEARNING, NATIONAL CHANGHUA UNIVERSITY OF EDUCATION.
BIOMETRICS VOICE RECOGNITION. Meaning Bios : LifeMetron : Measure Bios : LifeMetron : Measure Biometrics are used to identify the input sample when compared.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Chapter 5 - Input.
Dwell Time Selection & more…
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
Presentation transcript:

New Interaction Techniques Department of Computer Sciences University of Tampere, Finland September – December, 2003 Grigori Evreinov Access Control Key-typing biometrics ** **

TAUCHI MMIG G. Evreinov p 01_ Access Control Typing biometrics the remote communication requires increasing of general privacy the general methods of user verification (to verify a person's identity) are through the use of physical objects (tokens), knowledge (codes, passwords), or individual physical and behavioral characteristics - keystroke dynamics, fingerprints, voice patterns, signature dynamics typing biometrics is more commonly referred to as keystroke dynamics dynamics examines the way in which a person types or keys on a keyboard this method is based on the typing of the individuals such as durations of keystrokes, and between keystrokes, inter-keystroke times, typing error, force keystrokes etc. another cause to investigate keystroke dynamics is the prospect of an appearance of force-sensitive keys in mobile devices [3]

TAUCHI MMIG G. Evreinov p 02_ A Personal Authentication with Keystroke Timing Patterns Toshimitsu YAMAGUCHI, Kazuhiro Notomi, Hiroaki Ishii personal authentication can be built on features analysis of the temporal structure of user behavior authors presented a method and a prototype system based on SOM * algorithm and keystroke timing patterns as input vectors for the learning PIN – 4 numerical characters, 8 trials for creating maps 40 trials for evaluation, 7 persons the result of experiment showed the system keeps a ration of False Acceptance Rate to False Rejection Rate on the maps about 25% * Self-Organizing Maps – neural network model, which is a general unsupervised learning method for ordering high-dimensional stat. data Access Control

TAUCHI MMIG G. Evreinov p 03_ Keystroke dynamics as a biometric for authentication Fabian Monrose, Aviel D. Rubin [4] the graphs showed that on an average, the user suppresses keys for a longer period than it takes to type them Access Control

TAUCHI MMIG G. Evreinov p 04_ Longitudinal Characteristics of Proprioceptive Memory on Keystrokes: Designing for an Enhanced Authentication System Using Pressures of Keystroke Kentaro KOTANI, Ken Horii empirical verification was demonstrated for the use of pressures of keystroke incorporated with the keystroke dynamics profile for secured authentication results revealed that multi-modal approach was more effective than the conventional authentication using keystroke latencies a numerical keypad was made such that a 5mm-diameter force-sensitive resistor was equipped at the surface of each pad for the measurement of keystroke force Access Control

TAUCHI MMIG G. Evreinov p 05_ Demo Access Control [1, 2]

TAUCHI MMIG G. Evreinov p 06_ Usability-testing software for… Access Control txtEntry Access

Access Control Clear Data TAUCHI MMIG G. Evreinov p 07_ TWords.txt /phrases (20) GridData1: test words/chars entered text /chars time per char, ms duration when button was down per char, ms GridData2: char per word /phrase num. of entered words num. of strokes /clicks per word /phrase time per word/phrase, s duration when button was down per word, s lblTestSymbol txtText1 On-screen Keyboard Break test Test initialization Ctrl+K=>move keys SetSigns SetCharacters BackSp Statistics() Latency, ms s (st.dev), ms Duration, ms s, ms Errors wpm TestTime, s lblSave_Click() + column 4 GridData2_Click() to save column to build graphics GridData1_Click() to save column to build graphics txtPersonData comments… fraData WordsLoading SetTest lblOpen_Click() + column 4 SetData Trial start Timer1 Timer2 SpotActivate BorderOn BorderOff BtnDownDrawGraph Graph

TAUCHI MMIG G. Evreinov p 08_ References [1] BioPassword FAQ, or [2] BP-127 BioPassword Logon Protection v [3] New opportunities with flat sensors [4] Monrose, F., Rubin, A.D. Keystroke dynamics as a biometric for authentication. Future Generation Computer Systems 16 (2000) 351– [5] ePad™ electronic signature tablets, [6] Pressure Sensing Technology, [7] Mascaro, S.A. and Asada, H.H. Photoplethysmograph Fingernail Sensors for Measuring Finger Forces Without Haptic Obstruction. IEEE Transactions on Robotics and Automation, 17 (5), October 2001 [8] An introduction to biometrics. Access Control