|
Photo by ID Control BV |
KeystrokeID is based on the recognition of a person¡¯s typing rhythm during logon based on only filling out the username and password in the blank fields. This biometric authentication technique based on typing behavior analysis and recognition refers to the term Keystroke Dynamics. KeystrokeID is recording, analyzing and recognizing all the unique keystroke behavior of a users login credentials (username and password) before granting access.
Keystroke Dynamics is measured through ¡®dwell time¡¯ (the time a key is pressed), and the ¡®flight time¡¯ (the time between ¡®key down¡¯ and the next ¡®key down¡¯ and the time between ¡®key up¡¯ and the next ¡®key up¡¯. When the typing behavior of the user is recorded, it¡¯s being compared to the scores of the unique keystroke behavior of previous sessions. The result of this comparison is the score, which, when high enough, leads to positive identification or verification of the user. KeystrokeID delivers strong authentication protection against online fraud and theft for access to networks and Web-based applications.
Hans Kortekaas, CEO of ID Control, indicates that since KeystrokeID requires no hardware for strong authentication to Web-based applications server- based computing and networks, the costs for distribution, support and purchase become tremendously lower. He explains that users won¡¯t even notice the difference since the same keyboard and logon process as before are used for authentication. KeystrokeID is an affordable and user-friendly biometric authentication technique that is already available for online applications, Web-based email and other services. In high contrast to physical biometrics, such as the fingerprint and iris scan, KeystrokeID minimizes the impact on the user¡¯s privacy and is very easy to enrol. With KeystrokeID its only you who can claim and prove to be you by the way you type to logon to networks, Web-based applications and server-based computing.
For more information, please send your e-mails to swm@infothe.com.
¨Ï2007 www.SecurityWorldMag.com. All rights reserved.
|