Download presentation
Presentation is loading. Please wait.
Published byMeredith Conley Modified over 9 years ago
1
Keystroke Authentication It’s All in How You Type John C. Checco BiometriTech 2003 bioChec™
2
Overview What is Keystroke Authentication How Effective is Keystroke Authentication Advantages of Keystroke Authentication Markets for Keystroke Authentication Future for Keystroke Authentication
3
What is Keystroke Authentication Biological Measurements Measurement of physical aspects of a person that determine identity Static measurement ڤAbsolute match Quality of measurement is only variable by the quality of the capture device. Examples: ڤDNA, ڤIris/Retina Scan, ڤFingerprint, ڤHand Geometry … Behavioral Measurements Measurement of characteristic traits exhibited by a person that can determine identity Dynamic measurement ڤConfidence match Quality of measurement varies by behavioral and other external factors. Examples: ڤKeystroke Heuristics, ڤHandwriting Analysis, ڤVoice Verification …
4
What is Keystroke Authentication Keystroke Heuristics / Keystroke Dynamics Pattern exhibited by a person using an input device in a consistent manner ڤKeyboard, Keypad, Stylus ڤRelies on spatial configuration, timing, cadence, and content. Measurements captured are already available by the input device: ڤDwell time ڤFlight time ڤAbsolute versus Relative timing Processing consists of deducing a series of key factors from an arbitrary data stream: ڤRobotic vision, Economic trending, Quantum physics ڤBeing consistent as well as consistently inconsistent.
5
What is Keystroke Authentication History of the World, Part I 1979: ڤTechnology originally developed by SRI International. 1984: ڤNational Bureau of Standards (NBS) study concluded that computer keystroke authentication of 98% accuracy. 1988: ڤKeystroke authentication hardware device passes NIST Computer Security Act of 1987. 2000: ڤKeystroke authentication passes the Financial Services Technology Consortium (FSTC) / International Biometric Group (IBG) Comparative Testing program. Patents (partial list): ڤ4621344, 5557686, 4805222, 4962530, 4998279, 5056141
6
How Effective is Keystroke Authentication Fingerprint FAR= ~0% FRR= ~1% Keystroke Heuristics FAR = ~0.01% FRR = ~3.0% ڤManufacturer recommended settings ڤVariable (application-defined) Facial Recognition FAR/FRR vary according to: compression, distance, illumination, media, pose, resolution, and other temporal factors. Voice Recognition FAR = ~1.6% FRR = ~8.1%
7
How Effective is Keystroke Authentication What If …. I injure my hand? ڤHow many people have you met that have had hand injuries? ڤHow many people have you met that forgot their password? I enrolled on one keyboard and want to login on another? ڤTactile versus membrane ڤFull-size versus compact ڤKey-character layout My connection is hijacked and someone replays my keystrokes? ڤFraud detection methods vary by manufacturer. I have a bad day?
8
Advantages of Keystroke Authentication Deployment / Maintenance: No physical hardware to install or maintain. No manpower needed on client-side deployment for installations or upgrades. Technical: Inherently narrows the identification pool to achieve authentication FAR/FRR. Portable: Users are not limited to individual or specific workstations. Can support remote access and telecommuting Adjustable: Application and/or user managed levels of security. Can constantly adjust/refine a user’s biometric template over time. Breadth: Software-only components allow integration into any software project. User Acceptance: Non-invasive capture Can support invisible (background) enrollment. Works better with phrases familiar (easy to remember) for the user.
9
Markets for Keystroke Authentication Network Security: Integration with Single Sign-on Solutions. RADIUS integration Integration into terminal access applications. Integration into NTFS Volume Protection. Promote proper use of existing licensing. Logging of biometric access creates better forensic evidence. Personal Information Security: Primary authorization for individual document encryption. Secondary authorization mechanism for online purchases. Asset Identification: Integration with Online Training/Testing. Document signing (e.g. HIPAA) Software Licensing and Registration.
10
Future for Keystroke Authentication Consumer Market: ATM PDA RIM Cell phones Home Security Access Pads
11
Questions and Comments Notes:
12
Contact Information John C. Checco President, bioChec™ Checco Services, Inc. info@biochec.com 1-845-942-4246
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.