1 / 14

PLAY THE KEYBOARD

PLAY THE KEYBOARD. Zhao Tian Kai Liu. Outline. 1. Motivation. 2. Related Work. 3. Proposed Solution. 4. Preliminary Results. Password Is Not Secure. Numerous passwords in the Internet. Security is significant!. Passwords around us. Secure?. NO!. When Password Is Disclosed.

roza
Download Presentation

PLAY THE KEYBOARD

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. PLAY THE KEYBOARD Zhao Tian Kai Liu

  2. Outline 1. Motivation 2. Related Work 3. Proposed Solution 4. Preliminary Results

  3. Password Is Not Secure Numerous passwords in the Internet. Security is significant! Passwords around us Secure? NO!

  4. When Password Is Disclosed We could let out our key accidently How to protect the password even if it has already been disclosed?

  5. Analogy: Password vs. Music Score Can we distinguish the keyboard players? VS Same as the music score, the players can be distinguished.

  6. Outline 1. Motivation 2. Related Work 3. Proposed Solution 4. Preliminary Results

  7. Ways To Enhance Authentication Digital Identification Biometrics Cost too much

  8. Keystroke Pattern “Research results demonstrate that users follow generally certain patterns when they are writing their password.” Coltell, O., Badfa, J.M., Torres, G., “Biometric identification system based on keyboard filtering”, Security Technology, 1999. Proceedings. IEEE 33rd Annual 1999 International Carnahan Conference on, On page(s): 203-209

  9. Outline 1. Motivation 2. Related Work 3. Proposed Solution 4. Preliminary Results

  10. Input & Send the Password V V m m d d 5 5 r r q q 2 2 o o t1 t2 t3 t4 t5 t6 t7 t8 Time

  11. Receive & Match the Password Match V m d 5 r q 2 o t1 t2 t3 t4 t5 t6 t7 t8 Stored Pattern V m d 5 r q 2 o s1 s2 s3 s4 s5 s6 s7 s8 Time Time

  12. Outline 1. Motivation 2. Related Work 3. Proposed Solution 4. Preliminary Results

  13. Password Is Stolen Not Match 2 o V m 5 r d q t7 t8 t1 t2 t4 t5 t3 t6 Stored Pattern V m d 5 r q 2 o s1 s2 s3 s4 s5 s6 s7 s8 Time Time

  14. THE END!THANK YOU!

More Related