The Community for Technology Leaders
Green Image
<p>An approach to securing access to computer systems is described. By performing real-time measurements of the time durations between the keystrokes when a password is entered and using pattern-recognition algorithms, three online recognition systems were devised and tested. Two types of passwords were considered: phrases and individual names. A fixed phrase was used in the identification system. Individual names were used as a password in the verification system and in the overall recognition system. All three systems were tested and evaluated. The identification system used 10 volunteers and gave an indecision error of 1.2%. The verification system used 26 volunteers and gave an error of 8.1% in rejecting valid users and an error of 2.8% in accepting invalid users. The overall recognition system used 32 volunteers and gave an error of 3.1% in rejecting valid users and an error of 0.5% in accepting invalid users.</p>
computer access security systems; keystroke dynamics; real-time; password; online recognition systems; identification system; verification system; computerised pattern recognition; real-time systems; security of data
S. Bleha, B. Hussien, C. Slivinsky, "Computer-Access Security Systems Using Keystroke Dynamics", IEEE Transactions on Pattern Analysis & Machine Intelligence, vol. 12, no. , pp. 1217-1222, December 1990, doi:10.1109/34.62613
92 ms
(Ver 3.3 (11022016))