Results 1 to 2 of 2

Thread: Hey ... You're Not My User! Software Identifies Computer Users By Typing Style

  1. #1
    Senior Member Max's Avatar
    Join Date
    Jul 2001
    Location
    Montreal,Province of Quebec, CANADA
    Posts
    15,036

    Hey ... You're Not My User! Software Identifies Computer Users By Typing Style

    Hey ... You're Not My User! Software Identifies Computer Users By Typing Style
    Computing may be getting a lot more personal. Researchers at the Technion-Israel Institute of Technology have developed software that is able to identify computer users - with high accuracy - by their individual, distinct typing styles. This "behaviometric" technology may one day be part of security systems to prevent unauthorized users from gaining access to computers and sensitive data.

    The technology can be extended to other applications that involve a sufficiently complex interaction between humans and machines. Examples of such applications would include the identification of unauthorized drivers or pilots.

    The system prototype was developed in the Data Mining Lab of the Technion's Computer Science Faculty by students Ido Yariv and Mordechai Nisenson, under the supervision of Technion Professors Ran El-Yaniv and Ron Meir. The group's findings were presented on September 25, 2003 at the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML/PKDD) held in Cavtat, Croatia.

    "This software is based upon a universal prediction algorithm," explains El-Yaniv. "It utilizes statistics gathered while a person types freely, and learns the specific behavior patterns that accurately identify the typist." He goes on to explain that time differential patterns between consecutive keystrokes can uniquely determine a user. In some cases, this can be accomplished after only a very few keystrokes.

    The system's innovation is the ability to identify the legal user as he/she types freely, a stark contrast to currently existing technologies that can only achieve equally high recognition rates if both the legal user and the intruder are asked to type the same long sentence (similar to standard passwords).

    The system's accuracy depends upon the length of its training. But even after a relatively short session consisting of several typed sentences, the system can distinguish the user from potential intruders with around 90 percent accuracy from a sentence as short as 'What did you do today?' After its initial training, the system continues monitoring the user and obtaining more keystroke sequences, allowing it to reach extremely high rates of recognition.

    According to El-Yaniv, typing is a complex sequence of events. Many processes and factors make up this sequence, including language fluency, mental attributes, fine motor skills, hand size and finger length. As part of their ongoing research, the group will study the system's reliability in the face of "noise" that can be introduced by many factors such as a finger injury. El-Yaniv believes that since it is the user's behavior that is being measured (through the timing of keystrokes), there would still be enough information by which to make a very accurate identification.


    The Technion-Israel Institute of Technology is Israel's leading science and technology university. It commands a worldwide reputation for its pioneering work in computer science, biotechnology, water-resource management, materials engineering, aerospace and medicine. The majority of the founders and managers of Israel's high-tech companies are alumni. Based in New York City, the American Technion Society is the leading American organization supporting higher education in Israel, with more than 20,000 supporters and 19 offices around the country.

    Editor's Note: The original news release can be found here.


    --------------------------------------------------------------------------------

    This story has been adapted from a news release issued by American Technion Society.


    http://www.sciencedaily.com/releases...1003062125.htm

  2. #2
    Senior Member zagam's Avatar
    Join Date
    Jan 2007
    Location
    Western Australia - Hammer wielding daemon
    Posts
    619

    Not much since 2001

    If you're spac and don't have a style?
    May breach the DDA.
    Security would have to be proven over non-discriminating techniques to establish a hardship defense. When was the last time "security" was proven?
    To do this you would need to establish that it mitigates threats known to be in the wild.
    Do you have to tap your foot to keep rythm?

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •