Security

Secure Collaborative Network Using Up Up Key Stroke Latency Algorithm

Download Now Free registration required

Executive Summary

The keystroke patterns produced during typing is found to be unique for every individual, just like handwritten text. Therefore, these keystroke patterns can be used as a biometric data to authenticate a user over the internet. In particular, keystroke recognition can enhance the username and password security model by monitoring the way these strings are typed. Here, the authors propose a new up keystroke latency algorithm that considers time gap between two consecutive key releases during typing for uniquely identifying a user. By this algorithm they can authenticate users with different typing patterns where some key releases occur after the press of the next key. This algorithm provides very low values of false acceptance and false rejection rates providing high security.

  • Format: PDF
  • Size: 407.93 KB