A method of automatic user authentication by fulltime monitoring of keystroke timings

Masanori Nakakuni, Hiroshi Dozono, Eisuke Ito, Yoshiaki Kasahara

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    抄録

    This paper will propose a method of user authentication that constantly monitors the keystroke timings of a computer user, identifies a user based on the characteristics of keystrokes and discovers spoofing. This method authenticates users by comparing past and current keystroke timings when a user is working on a computer. This method has the following two main advantages. One is that it discovers spoofing even when users change while logged in. When a user pushes keys to operate a computer, the computer automatically performs personal authentication. Users do not have to take any special action for personal authentication. This paper will also propose how to enhance security using these characteristics in combination with existing user authentication methods.

    本文言語英語
    ホスト出版物のタイトルProceedings of the 2008 International Conference on Security and Management, SAM 2008
    ページ58-63
    ページ数6
    出版ステータス出版済み - 12 1 2008
    イベント2008 International Conference on Security and Management, SAM 2008 - Las Vegas, NV, 米国
    継続期間: 7 14 20087 17 2008

    出版物シリーズ

    名前Proceedings of the 2008 International Conference on Security and Management, SAM 2008

    その他

    その他2008 International Conference on Security and Management, SAM 2008
    Country米国
    CityLas Vegas, NV
    Period7/14/087/17/08

    All Science Journal Classification (ASJC) codes

    • Computational Theory and Mathematics
    • Computer Science Applications
    • Software

    フィンガープリント 「A method of automatic user authentication by fulltime monitoring of keystroke timings」の研究トピックを掘り下げます。これらがまとまってユニークなフィンガープリントを構成します。

    引用スタイル