Keystroke Authentication It’s All in How You Type John C. Checco BiometriTech 2003 bioChec™
Overview What is Keystroke Authentication How Effective is Keystroke Authentication Advantages of Keystroke Authentication Markets for Keystroke Authentication Future for Keystroke Authentication
What is Keystroke Authentication Biological Measurements Measurement of physical aspects of a person that determine identity Static measurement ڤAbsolute match Quality of measurement is only variable by the quality of the capture device. Examples: ڤDNA, ڤIris/Retina Scan, ڤFingerprint, ڤHand Geometry … Behavioral Measurements Measurement of characteristic traits exhibited by a person that can determine identity Dynamic measurement ڤConfidence match Quality of measurement varies by behavioral and other external factors. Examples: ڤKeystroke Heuristics, ڤHandwriting Analysis, ڤVoice Verification …
What is Keystroke Authentication Keystroke Heuristics / Keystroke Dynamics Pattern exhibited by a person using an input device in a consistent manner ڤKeyboard, Keypad, Stylus ڤRelies on spatial configuration, timing, cadence, and content. Measurements captured are already available by the input device: ڤDwell time ڤFlight time ڤAbsolute versus Relative timing Processing consists of deducing a series of key factors from an arbitrary data stream: ڤRobotic vision, Economic trending, Quantum physics ڤBeing consistent as well as consistently inconsistent.
What is Keystroke Authentication History of the World, Part I 1979: ڤTechnology originally developed by SRI International. 1984: ڤNational Bureau of Standards (NBS) study concluded that computer keystroke authentication of 98% accuracy. 1988: ڤKeystroke authentication hardware device passes NIST Computer Security Act of 2000: ڤKeystroke authentication passes the Financial Services Technology Consortium (FSTC) / International Biometric Group (IBG) Comparative Testing program. Patents (partial list): ڤ , , , , ,
How Effective is Keystroke Authentication Fingerprint FAR= ~0% FRR= ~1% Keystroke Heuristics FAR = ~0.01% FRR = ~3.0% ڤManufacturer recommended settings ڤVariable (application-defined) Facial Recognition FAR/FRR vary according to: compression, distance, illumination, media, pose, resolution, and other temporal factors. Voice Recognition FAR = ~1.6% FRR = ~8.1%
How Effective is Keystroke Authentication What If …. I injure my hand? ڤHow many people have you met that have had hand injuries? ڤHow many people have you met that forgot their password? I enrolled on one keyboard and want to login on another? ڤTactile versus membrane ڤFull-size versus compact ڤKey-character layout My connection is hijacked and someone replays my keystrokes? ڤFraud detection methods vary by manufacturer. I have a bad day?
Advantages of Keystroke Authentication Deployment / Maintenance: No physical hardware to install or maintain. No manpower needed on client-side deployment for installations or upgrades. Technical: Inherently narrows the identification pool to achieve authentication FAR/FRR. Portable: Users are not limited to individual or specific workstations. Can support remote access and telecommuting Adjustable: Application and/or user managed levels of security. Can constantly adjust/refine a user’s biometric template over time. Breadth: Software-only components allow integration into any software project. User Acceptance: Non-invasive capture Can support invisible (background) enrollment. Works better with phrases familiar (easy to remember) for the user.
Markets for Keystroke Authentication Network Security: Integration with Single Sign-on Solutions. RADIUS integration Integration into terminal access applications. Integration into NTFS Volume Protection. Promote proper use of existing licensing. Logging of biometric access creates better forensic evidence. Personal Information Security: Primary authorization for individual document encryption. Secondary authorization mechanism for online purchases. Asset Identification: Integration with Online Training/Testing. Document signing (e.g. HIPAA) Software Licensing and Registration.
Future for Keystroke Authentication Consumer Market: ATM PDA RIM Cell phones Home Security Access Pads
Questions and Comments Notes:
Contact Information John C. Checco President, bioChec™ Checco Services, Inc