This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Typing Patterns: A Key to User Identification
September-October 2004 (vol. 2 no. 5)
pp. 40-47
Alen Peacock, Massachusetts Institute of Technology
Xian Ke, Massachusetts Institute of Technology
Matthew Wilkerson, Massachusetts Institute of Technology
The deficiencies of traditional password-based access systems have become more acute as these systems have grown in size and scope. Researchers are actively investigating ways to improve the security of password systems or offer replacements. One category of improvements uses keystroke biometrics, an approach which seeks to identify an individual by their typing characteristics. Since 1980, a number of techniques have been proposed for accurately harnessing keystroke dynamics for system authentication and other novel uses. But do these systems deliver on their promise to increase system security and simultaneously ease the burden of logging into systems and remembering passwords? And do databases of users' keystroke profiles present additional privacy concerns? In the following article, the authors address these issues while surveying the last quarter-century's developments, comparing results from the field with both well-known and newly proposed metrics, and examining potential roadblocks to widespread implementation of keystroke biometrics.
Index Terms:
Biometrics, Keystroke, Typing, User Identification, User Authentication, network-level security and protection, Security and Privacy Protection, Security, Intellectual Property, Authentication, Authentication, Pattern Recognition
Citation:
Alen Peacock, Xian Ke, Matthew Wilkerson, "Typing Patterns: A Key to User Identification," IEEE Security & Privacy, vol. 2, no. 5, pp. 40-47, Sept.-Oct. 2004, doi:10.1109/MSP.2004.89
Usage of this product signifies your acceptance of the Terms of Use.