Browse Prior Art Database

A Keystroke-Dynamics Based Method for Passwordless Verification

IP.com Disclosure Number: IPCOM000182006D
Original Publication Date: 2009-Apr-22
Included in the Prior Art Database: 2009-Apr-22
Document File: 1 page(s) / 29K

Publishing Venue

IBM

Abstract

This article proposes a keystroke-dynamics based method that allows an end user to log in to his/her machine with no password or special sensors. The core idea is that the machine learns the user's keystroke patterns and, on login attempt, presents some text for the user to type.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 68% of the total text.

Page 1 of 1

Ȉ ˇ ˄

The problem of verifying an end user at a computer/terminal is well known for decades. There are many known solutions to this problem, such as:

Passwords - There's a tradeoff between password strength and the end user ability to remember it


Biometric identification - Requires special hardware at the end point

Voice recognition

- High false-positive ratio, sensitive to background noise

Ȉ ˇ ˄

Ȉ ˇ ˄ Ȉ ˇ ˄

and emotional variations


Keystroke verification [1] - Requires teaching the machine every time password is changed


Keystroke identification [1] - Requires additional verification method for the first ~100 characters typed, until the user is identified
We proposed a keystroke-dynamics based method that allows an end user to log in to his/her machine with no password or special sensors. The core idea is that the machine learns the users keystroke patterns and, on login attempt, presents some text for the user to type. The process has several stages:
1. Initial set-up:

After the user is created,

                  he is requested to type some random words, in order to create an initial keystroke dynamics patterns (several machine learning algorithms are presented in [1] and cited papers).
2. During subsequent sessions (after user is verified as later shown):

The user,

while performing his regular activities

                                 (e.g. typing an email), provides input to the machine learning algorithm,

which continuously

(or

periodically) analyzes his ke...