1 / 9

New Interaction Techniques

**. New Interaction Techniques. Access Control Key-typing biometrics. Grigori Evreinov. Department of Computer Sciences University of Tampere, Finland. Department of Computer Sciences University of Tampere, Finland. www.cs.uta.fi/~grse/. ** http://www.lfe.mw.tum.de/~marstaller/links.html.

yuma
Download Presentation

New Interaction Techniques

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. ** New Interaction Techniques Access Control Key-typing biometrics Grigori Evreinov Department of Computer SciencesUniversity of Tampere, Finland Department of Computer SciencesUniversity of Tampere, Finland www.cs.uta.fi/~grse/ **http://www.lfe.mw.tum.de/~marstaller/links.html September – December, 2003

  2. Access Control Typing biometrics the remote communication requires increasing of general privacy the general methods of user verification (to verify a person's identity) are through the use of physical objects (tokens), knowledge (codes, passwords), or individual physical and behavioral characteristics - keystroke dynamics, fingerprints, voice patterns, signature dynamics typing biometrics is more commonly referred to as keystroke dynamics dynamics examines the way in which a person types or keys on a keyboard this method is based on the typing of the individuals such as durations of keystrokes, and between keystrokes, inter-keystroke times, typing error, force keystrokes etc. another cause to investigate keystroke dynamics is the prospect of an appearance of force-sensitive keys in mobile devices [3] TAUCHI MMIG G. Evreinov p 01_08 03.10.2003

  3. Access Control A Personal Authentication with Keystroke Timing PatternsToshimitsu YAMAGUCHI, Kazuhiro Notomi, Hiroaki Ishii personal authentication can be built on features analysis of the temporal structure of user behavior authors presented a method and a prototype system based on SOM* algorithm and keystroke timing patterns as input vectors for the learning PIN – 4 numerical characters, 8 trials for creating maps 40 trials for evaluation, 7 persons the result of experiment showed the system keeps a ration of False Acceptance Rate to False Rejection Rate on the maps about 25% * Self-Organizing Maps – neural network model, which is a general unsupervised learning method for ordering high-dimensional stat. data TAUCHI MMIG G. Evreinov p 02_08 03.10.2003

  4. Access Control Keystroke dynamics as a biometric for authentication Fabian Monrose, Aviel D. Rubin [4] the graphs showed that on an average, the user suppresses keys for a longer period than it takes to type them TAUCHI MMIG G. Evreinov p 03_08 03.10.2003

  5. Access Control Longitudinal Characteristics of Proprioceptive Memory on Keystrokes: Designing for an Enhanced Authentication System Using Pressures of Keystroke Kentaro KOTANI, Ken Horii empirical verification was demonstrated for the use of pressures of keystroke incorporated with the keystroke dynamics profile for secured authentication results revealed that multi-modal approach was more effective than the conventional authentication using keystroke latencies a numerical keypad was made such that a 5mm-diameter force-sensitive resistor was equipped at the surface of each pad for the measurement of keystroke force TAUCHI MMIG G. Evreinov p 04_08 03.10.2003

  6. Access Control Demo [1, 2] TAUCHI MMIG G. Evreinov p 05_08 03.10.2003

  7. Access Control Usability-testing software for… txtEntry Access TAUCHI MMIG G. Evreinov p 06_08 03.10.2003

  8. Timer2 Timer1 Access Control TWords.txt /phrases (20) txtPersonData comments… WordsLoading fraData GridData1: test words/chars entered text /chars time per char, ms duration when button was down per char, ms Test initialization SetTest lblSave_Click() + column 4 lblTestSymbol lblOpen_Click() + column 4 txtText1 SetData GridData1_Click() to save column to build graphics Graph BorderOff Statistics() Latency, ms s (st.dev), ms Duration, ms s, ms Errors wpm TestTime, s GridData2: char per word /phrase num. of entered words num. of strokes /clicks per word /phrase time per word/phrase, s duration when button was down per word, s BorderOn BtnDown DrawGraph SpotActivate Ctrl+K=>move keys On-screen Keyboard SetSigns SetCharacters BackSp Trial start GridData2_Click() to save column to build graphics Break test Clear Data TAUCHI MMIG G. Evreinov p 07_08 03.10.2003

  9. Access Control References [1] BioPassword FAQ,http://www.lfca.net/bp_faq.htm http://www.biopassword.com/home/technology/biometrics.asp orhttp://www.cs.uta.fi/~grse/NIT_2003/NIT_Practice/AccessControl/Software/biodemo.zip [2] BP-127 BioPassword Logon Protection v4.5http://www.lfca.net/bp_127.htm http://www.biopassword.com/home/technology/BP%204.5%20Technical%20Paper.pdf http://www.biopassword.com/home/products/BP_SDK2.0_021502.pdf [3] New opportunities with flat sensors http://www.tech21.de/en/sensor.html [4]Monrose, F., Rubin, A.D. Keystroke dynamics as a biometric for authentication. Future Generation Computer Systems 16 (2000) 351–359 http://citeseer.nj.nec.com/monrose99keystroke.html http://citeseer.nj.nec.com/monrose97authentication.html [5] ePad™ electronic signature tablets, http://www.steadlands.com/epad.htm [6] Pressure Sensing Technology,http://www.steadlands.com/pst.htm [7] Mascaro, S.A. and Asada, H.H. Photoplethysmograph Fingernail Sensors for Measuring Finger Forces Without Haptic Obstruction. IEEE Transactions on Robotics and Automation, 17 (5), October 2001 [8] An introduction to biometrics. http://www.biometrics.org/html/introduction.html TAUCHI MMIG G. Evreinov p 08_08 03.10.2003

More Related