{"title":"Utilization of keyboard dynamics for unique identification of human users","authors":"Tyler Highlander, Dale Bassett, Derek Boone","doi":"10.1109/NAECON.2014.7045794","DOIUrl":null,"url":null,"abstract":"For the past two decades, as the role of computer technology has expanded, computer security (secure processors, information encryption, network protection with biometrics) has also become increasingly important [1-21]. Many computer security schemes have been developed over this time period; however, none of these are foolproof yet. A username and pass-word combination is one of the most popular approaches to securing a computer system, but this system is vulnerable because passwords can be stolen or cracked. However, research suggests that it is possible to identify a user based strictly on their typing style, using pattern recognition, neural networks, and other techniques. This paper focuses on using the keyboard dynamics of the user's password to add an extra layer of security to the natural log-in process.","PeriodicalId":318539,"journal":{"name":"NAECON 2014 - IEEE National Aerospace and Electronics Conference","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"NAECON 2014 - IEEE National Aerospace and Electronics Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NAECON.2014.7045794","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
For the past two decades, as the role of computer technology has expanded, computer security (secure processors, information encryption, network protection with biometrics) has also become increasingly important [1-21]. Many computer security schemes have been developed over this time period; however, none of these are foolproof yet. A username and pass-word combination is one of the most popular approaches to securing a computer system, but this system is vulnerable because passwords can be stolen or cracked. However, research suggests that it is possible to identify a user based strictly on their typing style, using pattern recognition, neural networks, and other techniques. This paper focuses on using the keyboard dynamics of the user's password to add an extra layer of security to the natural log-in process.