A method of automatic user authentication by fulltime monitoring of keystroke timings

Masanori Nakakuni, Hiroshi Dozono, Eisuke Ito, Yoshiaki Kasahara

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

This paper will propose a method of user authentication that constantly monitors the keystroke timings of a computer user, identifies a user based on the characteristics of keystrokes and discovers spoofing. This method authenticates users by comparing past and current keystroke timings when a user is working on a computer. This method has the following two main advantages. One is that it discovers spoofing even when users change while logged in. When a user pushes keys to operate a computer, the computer automatically performs personal authentication. Users do not have to take any special action for personal authentication. This paper will also propose how to enhance security using these characteristics in combination with existing user authentication methods.

Original languageEnglish
Title of host publicationProceedings of the 2008 International Conference on Security and Management, SAM 2008
Pages58-63
Number of pages6
Publication statusPublished - Dec 1 2008
Event2008 International Conference on Security and Management, SAM 2008 - Las Vegas, NV, United States
Duration: Jul 14 2008Jul 17 2008

Publication series

NameProceedings of the 2008 International Conference on Security and Management, SAM 2008

Other

Other2008 International Conference on Security and Management, SAM 2008
CountryUnited States
CityLas Vegas, NV
Period7/14/087/17/08

    Fingerprint

All Science Journal Classification (ASJC) codes

  • Computational Theory and Mathematics
  • Computer Science Applications
  • Software

Cite this

Nakakuni, M., Dozono, H., Ito, E., & Kasahara, Y. (2008). A method of automatic user authentication by fulltime monitoring of keystroke timings. In Proceedings of the 2008 International Conference on Security and Management, SAM 2008 (pp. 58-63). (Proceedings of the 2008 International Conference on Security and Management, SAM 2008).