90 likes | 210 Views
**. New Interaction Techniques. Access Control Key-typing biometrics. Grigori Evreinov. Department of Computer Sciences University of Tampere, Finland. Department of Computer Sciences University of Tampere, Finland. www.cs.uta.fi/~grse/. ** http://www.lfe.mw.tum.de/~marstaller/links.html.
E N D
** New Interaction Techniques Access Control Key-typing biometrics Grigori Evreinov Department of Computer SciencesUniversity of Tampere, Finland Department of Computer SciencesUniversity of Tampere, Finland www.cs.uta.fi/~grse/ **http://www.lfe.mw.tum.de/~marstaller/links.html September – December, 2003
Access Control Typing biometrics the remote communication requires increasing of general privacy the general methods of user verification (to verify a person's identity) are through the use of physical objects (tokens), knowledge (codes, passwords), or individual physical and behavioral characteristics - keystroke dynamics, fingerprints, voice patterns, signature dynamics typing biometrics is more commonly referred to as keystroke dynamics dynamics examines the way in which a person types or keys on a keyboard this method is based on the typing of the individuals such as durations of keystrokes, and between keystrokes, inter-keystroke times, typing error, force keystrokes etc. another cause to investigate keystroke dynamics is the prospect of an appearance of force-sensitive keys in mobile devices [3] TAUCHI MMIG G. Evreinov p 01_08 03.10.2003
Access Control A Personal Authentication with Keystroke Timing PatternsToshimitsu YAMAGUCHI, Kazuhiro Notomi, Hiroaki Ishii personal authentication can be built on features analysis of the temporal structure of user behavior authors presented a method and a prototype system based on SOM* algorithm and keystroke timing patterns as input vectors for the learning PIN – 4 numerical characters, 8 trials for creating maps 40 trials for evaluation, 7 persons the result of experiment showed the system keeps a ration of False Acceptance Rate to False Rejection Rate on the maps about 25% * Self-Organizing Maps – neural network model, which is a general unsupervised learning method for ordering high-dimensional stat. data TAUCHI MMIG G. Evreinov p 02_08 03.10.2003
Access Control Keystroke dynamics as a biometric for authentication Fabian Monrose, Aviel D. Rubin [4] the graphs showed that on an average, the user suppresses keys for a longer period than it takes to type them TAUCHI MMIG G. Evreinov p 03_08 03.10.2003
Access Control Longitudinal Characteristics of Proprioceptive Memory on Keystrokes: Designing for an Enhanced Authentication System Using Pressures of Keystroke Kentaro KOTANI, Ken Horii empirical verification was demonstrated for the use of pressures of keystroke incorporated with the keystroke dynamics profile for secured authentication results revealed that multi-modal approach was more effective than the conventional authentication using keystroke latencies a numerical keypad was made such that a 5mm-diameter force-sensitive resistor was equipped at the surface of each pad for the measurement of keystroke force TAUCHI MMIG G. Evreinov p 04_08 03.10.2003
Access Control Demo [1, 2] TAUCHI MMIG G. Evreinov p 05_08 03.10.2003
Access Control Usability-testing software for… txtEntry Access TAUCHI MMIG G. Evreinov p 06_08 03.10.2003
Timer2 Timer1 Access Control TWords.txt /phrases (20) txtPersonData comments… WordsLoading fraData GridData1: test words/chars entered text /chars time per char, ms duration when button was down per char, ms Test initialization SetTest lblSave_Click() + column 4 lblTestSymbol lblOpen_Click() + column 4 txtText1 SetData GridData1_Click() to save column to build graphics Graph BorderOff Statistics() Latency, ms s (st.dev), ms Duration, ms s, ms Errors wpm TestTime, s GridData2: char per word /phrase num. of entered words num. of strokes /clicks per word /phrase time per word/phrase, s duration when button was down per word, s BorderOn BtnDown DrawGraph SpotActivate Ctrl+K=>move keys On-screen Keyboard SetSigns SetCharacters BackSp Trial start GridData2_Click() to save column to build graphics Break test Clear Data TAUCHI MMIG G. Evreinov p 07_08 03.10.2003
Access Control References [1] BioPassword FAQ,http://www.lfca.net/bp_faq.htm http://www.biopassword.com/home/technology/biometrics.asp orhttp://www.cs.uta.fi/~grse/NIT_2003/NIT_Practice/AccessControl/Software/biodemo.zip [2] BP-127 BioPassword Logon Protection v4.5http://www.lfca.net/bp_127.htm http://www.biopassword.com/home/technology/BP%204.5%20Technical%20Paper.pdf http://www.biopassword.com/home/products/BP_SDK2.0_021502.pdf [3] New opportunities with flat sensors http://www.tech21.de/en/sensor.html [4]Monrose, F., Rubin, A.D. Keystroke dynamics as a biometric for authentication. Future Generation Computer Systems 16 (2000) 351–359 http://citeseer.nj.nec.com/monrose99keystroke.html http://citeseer.nj.nec.com/monrose97authentication.html [5] ePad™ electronic signature tablets, http://www.steadlands.com/epad.htm [6] Pressure Sensing Technology,http://www.steadlands.com/pst.htm [7] Mascaro, S.A. and Asada, H.H. Photoplethysmograph Fingernail Sensors for Measuring Finger Forces Without Haptic Obstruction. IEEE Transactions on Robotics and Automation, 17 (5), October 2001 [8] An introduction to biometrics. http://www.biometrics.org/html/introduction.html TAUCHI MMIG G. Evreinov p 08_08 03.10.2003