Presentation is loading. Please wait.

Presentation is loading. Please wait.

Keystroke Authentication It’s All in How You Type John C. Checco BiometriTech 2003 bioChec™

Similar presentations


Presentation on theme: "Keystroke Authentication It’s All in How You Type John C. Checco BiometriTech 2003 bioChec™"— Presentation transcript:

1 Keystroke Authentication It’s All in How You Type John C. Checco BiometriTech 2003 bioChec™

2 Overview What is Keystroke Authentication How Effective is Keystroke Authentication Advantages of Keystroke Authentication Markets for Keystroke Authentication Future for Keystroke Authentication

3 What is Keystroke Authentication Biological Measurements  Measurement of physical aspects of a person that determine identity  Static measurement ڤAbsolute match  Quality of measurement is only variable by the quality of the capture device.  Examples: ڤDNA, ڤIris/Retina Scan, ڤFingerprint, ڤHand Geometry … Behavioral Measurements  Measurement of characteristic traits exhibited by a person that can determine identity  Dynamic measurement ڤConfidence match  Quality of measurement varies by behavioral and other external factors.  Examples: ڤKeystroke Heuristics, ڤHandwriting Analysis, ڤVoice Verification …

4 What is Keystroke Authentication Keystroke Heuristics / Keystroke Dynamics  Pattern exhibited by a person using an input device in a consistent manner ڤKeyboard, Keypad, Stylus ڤRelies on spatial configuration, timing, cadence, and content.  Measurements captured are already available by the input device: ڤDwell time ڤFlight time ڤAbsolute versus Relative timing  Processing consists of deducing a series of key factors from an arbitrary data stream: ڤRobotic vision, Economic trending, Quantum physics ڤBeing consistent as well as consistently inconsistent.

5 What is Keystroke Authentication History of the World, Part I  1979: ڤTechnology originally developed by SRI International.  1984: ڤNational Bureau of Standards (NBS) study concluded that computer keystroke authentication of 98% accuracy.  1988: ڤKeystroke authentication hardware device passes NIST Computer Security Act of 1987.  2000: ڤKeystroke authentication passes the Financial Services Technology Consortium (FSTC) / International Biometric Group (IBG) Comparative Testing program.  Patents (partial list): ڤ4621344, 5557686, 4805222, 4962530, 4998279, 5056141

6 How Effective is Keystroke Authentication Fingerprint  FAR= ~0%  FRR= ~1% Keystroke Heuristics  FAR = ~0.01%  FRR = ~3.0% ڤManufacturer recommended settings ڤVariable (application-defined) Facial Recognition  FAR/FRR vary according to: compression, distance, illumination, media, pose, resolution, and other temporal factors. Voice Recognition  FAR = ~1.6%  FRR = ~8.1%

7 How Effective is Keystroke Authentication What If ….  I injure my hand? ڤHow many people have you met that have had hand injuries? ڤHow many people have you met that forgot their password?  I enrolled on one keyboard and want to login on another? ڤTactile versus membrane ڤFull-size versus compact ڤKey-character layout  My connection is hijacked and someone replays my keystrokes? ڤFraud detection methods vary by manufacturer.  I have a bad day?

8 Advantages of Keystroke Authentication Deployment / Maintenance:  No physical hardware to install or maintain.  No manpower needed on client-side deployment for installations or upgrades. Technical:  Inherently narrows the identification pool to achieve authentication FAR/FRR. Portable:  Users are not limited to individual or specific workstations.  Can support remote access and telecommuting Adjustable:  Application and/or user managed levels of security.  Can constantly adjust/refine a user’s biometric template over time. Breadth:  Software-only components allow integration into any software project. User Acceptance:  Non-invasive capture  Can support invisible (background) enrollment.  Works better with phrases familiar (easy to remember) for the user.

9 Markets for Keystroke Authentication Network Security:  Integration with Single Sign-on Solutions.  RADIUS integration  Integration into terminal access applications.  Integration into NTFS Volume Protection.  Promote proper use of existing licensing.  Logging of biometric access creates better forensic evidence. Personal Information Security:  Primary authorization for individual document encryption.  Secondary authorization mechanism for online purchases. Asset Identification:  Integration with Online Training/Testing.  Document signing (e.g. HIPAA)  Software Licensing and Registration.

10 Future for Keystroke Authentication Consumer Market:  ATM  PDA  RIM  Cell phones  Home Security Access Pads

11 Questions and Comments Notes:

12 Contact Information John C. Checco President, bioChec™ Checco Services, Inc. info@biochec.com 1-845-942-4246


Download ppt "Keystroke Authentication It’s All in How You Type John C. Checco BiometriTech 2003 bioChec™"

Similar presentations


Ads by Google