General discussion

Locked

biometrics methods

By mawar14 ·
I've read about the biometrics methods and one of it is mouse dynamic. Anybody knows about the mouse dynamics. Where can i get any information or resources about it.

somebody please help me..thanks

This conversation is currently closed to new comments.

2 total posts (Page 1 of 1)  
| Thread display: Collapse - | Expand +

All Comments

Collapse -

mouse dynamics

by mbalk In reply to biometrics methods

This is a new one - I have been researching biometrics for several months, and until your question never thought of mouse dynamics.

It seems that mouse and keyboard dynamics is a method to distinquish users by their unique use of these input devices. The assumption is that we all have unique mouse movement and keyboard typing styles that can be tracked. Once these behaviors such as sites vists, mouse moves, quickness of typing and double clicking, etc. a profile emerges that identifies the user. A biometric system can be installed on a computer track movement to determine if your behavior is consistent with an authorized user - assume that this is a secondary authenication methodology to supplement id/password, smart card, fingerprint, etc.

Very interesting. I found a brief article from a firm called Predictive Networks.

http://www.predictivenetworks.com/products/Biometric_Differentiation.pdf

Michael

Collapse -

mouse dynamics

by mbalk In reply to biometrics methods

This is a new one - I have been researching biometrics for several months, and until your question never thought of mouse dynamics.

It seems that mouse and keyboard dynamics is a method to distinquish users by their unique use of these input devices. The assumption is that we all have unique mouse movement and keyboard typing styles that can be tracked. Once these behaviors such as sites vists, mouse moves, quickness of typing and double clicking, etc. a profile emerges that identifies the user. A biometric system can be installed on a computer track movement to determine if your behavior is consistent with an authorized user - assume that this is a secondary authenication methodology to supplement id/password, smart card, fingerprint, etc.

Very interesting. I found a brief article from a firm called Predictive Networks.

http://www.predictivenetworks.com/products/Biometric_Differentiation.pdf

Michael

Back to Security Forum
2 total posts (Page 1 of 1)  

Related Discussions

Related Forums