Technology News  |   Industry News  |   Product News  |   Business News  |   Event News  |
  CCTV Surveillance  |   Access Control  |   Biometric ID  |   Alarm & Detection  |   Security Parts & Devices  |   Integration & Convergence  |
  Corporate & Office  |   Education & Institutional  |   Financial  |   Game & Casino  |   Government & Public  |   Homeland Security  |   Hospital & Entertainment  |   IT Asset & Technology  |
  CCTV Surveillance  |   Access Control  |   Biometric ID  |   Alarm & Detection  |   Security Parts & Devices  |   Integration & Convergence  |
  CCTV Surveillance  |   Access Control  |   Biometric ID  |   Alarm & Detection  |   Security Parts & Devices  |   Integration & Convergence  |   Consulting & Services  |
  Edit Member Profile  |  Edit Company Profile  |  Change Password  |  My Resources Profiles  
  2009 MAR Issue   |   What is Digital Magazine?  |  How to use  |  Archives  |    
 
  SecurityWorldMag.com

SecurityWorld Online Magazine

CCTV Surveillance

Access Control

Biometric ID

Alarm & Detection

Security Parts & Devices

Integration & Convergence

Biometric ID

Analyzing Typing Behavior

Keystroke recognition can help fight online identity theft and fraud
ID Control BV, a specialist in advanced online identity and access management, announced a solution to fight online identity theft and fraud with user¡¯s unique and characteristic typing behavior pattern recognition.

Photo by ID Control BV

 

KeystrokeID is based on the recognition of a person¡¯s typing rhythm during logon based on only filling out the username and password in the blank fields. This biometric authentication technique based on typing behavior analysis and recognition refers to the term Keystroke Dynamics.  KeystrokeID is recording, analyzing and recognizing all the unique keystroke behavior of a users login credentials (username and password) before granting access.

Keystroke Dynamics is measured through ¡®dwell time¡¯ (the time a key is pressed), and the ¡®flight time¡¯ (the time between ¡®key down¡¯ and the next ¡®key down¡¯ and the time between ¡®key up¡¯ and the next ¡®key up¡¯.  When the typing behavior of the user is recorded, it¡¯s being compared to the scores of the unique keystroke behavior of  previous sessions.  The result of this comparison is the score, which, when high enough, leads to positive identification or verification of the user. KeystrokeID delivers strong authentication protection against online fraud and theft for access to networks and Web-based applications.

Hans Kortekaas, CEO of ID Control, indicates that since KeystrokeID requires no hardware for strong authentication to Web-based applications server- based computing and networks, the costs for distribution, support and purchase become tremendously lower.  He explains that users won¡¯t even notice the difference since the same keyboard and logon process as before are used for authentication.  KeystrokeID is an affordable and user-friendly biometric authentication technique that is already available for online applications, Web-based email and other services.  In high contrast to physical biometrics, such as the fingerprint and iris scan, KeystrokeID minimizes the impact on the user¡¯s privacy and is very easy to enrol.  With KeystrokeID its only you who can claim and prove to be you by the way you type to logon to networks, Web-based applications and server-based computing.

 

For more information, please send your e-mails to swm@infothe.com.

¨Ï2007 www.SecurityWorldMag.com. All rights reserved.

 

 

 
 

     Hands to Manage Nursing Home



k510 Guard Patr...
Home l New Product Showcase l Gold Suppliers l Trade Shows l email Newsletter l About SWM l Help l Site Map l Partnerships l Privacy Policy | Newsletter
Publisher: Choi Jung-sik | Edited by: Lee Sang-yul | Youth Protection Officer: Lee Sang-yul
Copyright Notice ¨Ï 2004-2007 www.SecurityWorldMag.com Corporation and its licensors. All rights reserved.