user identification through keystroke
DESCRIPTION
TRANSCRIPT
![Page 1: User identification through keystroke](https://reader036.vdocuments.net/reader036/viewer/2022081518/546e74bfaf795958298b5855/html5/thumbnails/1.jpg)
User Identification Through “Key-Stroke Biometrics”
![Page 2: User identification through keystroke](https://reader036.vdocuments.net/reader036/viewer/2022081518/546e74bfaf795958298b5855/html5/thumbnails/2.jpg)
Objectives… What is Biometrics? What are the different types of
Biometrics? Key-Stroke Biometric
What is it? How it works? Analysis of inter-keystroke timing of user code Benefits Advantages Disadvantages
Conclusion
![Page 3: User identification through keystroke](https://reader036.vdocuments.net/reader036/viewer/2022081518/546e74bfaf795958298b5855/html5/thumbnails/3.jpg)
User Identification Approaches
![Page 4: User identification through keystroke](https://reader036.vdocuments.net/reader036/viewer/2022081518/546e74bfaf795958298b5855/html5/thumbnails/4.jpg)
Biometric…
![Page 5: User identification through keystroke](https://reader036.vdocuments.net/reader036/viewer/2022081518/546e74bfaf795958298b5855/html5/thumbnails/5.jpg)
Physiological Characteristics
Fingerprints
Iris
Facial
Blood vessel/vein pattern
![Page 6: User identification through keystroke](https://reader036.vdocuments.net/reader036/viewer/2022081518/546e74bfaf795958298b5855/html5/thumbnails/6.jpg)
Behavioral characteristics
![Page 7: User identification through keystroke](https://reader036.vdocuments.net/reader036/viewer/2022081518/546e74bfaf795958298b5855/html5/thumbnails/7.jpg)
Key-Stroke Biometric… What is it…??
![Page 8: User identification through keystroke](https://reader036.vdocuments.net/reader036/viewer/2022081518/546e74bfaf795958298b5855/html5/thumbnails/8.jpg)
Key-Stroke (Dynamics) Biometrics
![Page 9: User identification through keystroke](https://reader036.vdocuments.net/reader036/viewer/2022081518/546e74bfaf795958298b5855/html5/thumbnails/9.jpg)
Main (){ If (user = = new) { //register the user //add the user to the database Obtain the password Add user (database); } else { read (user); read (deviation); if (usercount>=15 && usercount<=20)
{ add userpass (database);}
else{
read (deviation);}
if (check (user, password, deviation)){ login;}
else exit(0); }}
![Page 10: User identification through keystroke](https://reader036.vdocuments.net/reader036/viewer/2022081518/546e74bfaf795958298b5855/html5/thumbnails/10.jpg)
![Page 11: User identification through keystroke](https://reader036.vdocuments.net/reader036/viewer/2022081518/546e74bfaf795958298b5855/html5/thumbnails/11.jpg)
Data Capture
![Page 12: User identification through keystroke](https://reader036.vdocuments.net/reader036/viewer/2022081518/546e74bfaf795958298b5855/html5/thumbnails/12.jpg)
Analysis of inter-keystroke timing of user code
![Page 13: User identification through keystroke](https://reader036.vdocuments.net/reader036/viewer/2022081518/546e74bfaf795958298b5855/html5/thumbnails/13.jpg)
Analysis of inter-keystroke timing of user code
![Page 14: User identification through keystroke](https://reader036.vdocuments.net/reader036/viewer/2022081518/546e74bfaf795958298b5855/html5/thumbnails/14.jpg)
Benefits… Provision for adjusting FRR/FAR. It continuously captures the
rhythm of typing till the end.
![Page 15: User identification through keystroke](https://reader036.vdocuments.net/reader036/viewer/2022081518/546e74bfaf795958298b5855/html5/thumbnails/15.jpg)
Advantages… Software Only method. (No Additional Hardware except a Keyboard) Simple To Deploy and Use (username & passwords) – Universally
accepted Cost Effective No End-User Training Computer security Less space
![Page 16: User identification through keystroke](https://reader036.vdocuments.net/reader036/viewer/2022081518/546e74bfaf795958298b5855/html5/thumbnails/16.jpg)
Disadvantages… Typing patterns can be rather erratic. Inconsistent. Difficult when authorized user is
injured. Typing pattern vary based on the
type of the key-board being used, the key-board layout (i.e. qwerty pad).
![Page 17: User identification through keystroke](https://reader036.vdocuments.net/reader036/viewer/2022081518/546e74bfaf795958298b5855/html5/thumbnails/17.jpg)
Conclusion… It seems promising , still needs more efforts
specially for identification As the security mechanism is not visible,
unauthorized users can’t have an idea of the security measure.
Keystroke biometrics is a fool proof security solution.
It is quickly emerging as a viable, low cost, non-intrusive alternative to traditional biometric technologies.
![Page 18: User identification through keystroke](https://reader036.vdocuments.net/reader036/viewer/2022081518/546e74bfaf795958298b5855/html5/thumbnails/18.jpg)
Thank You…