Find a Question:
A new method for user authentication
Every day we are faced with a certain amount of personal passwords that we introduce to login to websites, unlocking or using credit cards. However, these passwords can spy, steal or extort a person, thereby gaining access to classified information. But engineers at Iowa State University (USA) have come up with a completely new way to identify the user.
The essence of this method is to track individual schemes and typing the user with a mobile device or a computer mouse. Says Associate Professor Morris Chang, the manner of typing or manner of use of the mobile device and computer mouse, unique to each person. Here, everything is unique – a pause between words, the search for new characters and their writing. Researchers call this process “cognitive fingerprint” that appear in the rhythm of the character set, the website scmagazine.com.au.
Created prototype software already determines the differences in the rhythm of typing. In experiments at the University of Iowa attended by more than 2,000 users, and the program showed false identification and false rejection in approximately 0.5% of cases. Engineers intend to improve the accuracy of these figures by combining the analysis method of typing and how to use a mouse or a mobile device.
Currently defense research agency DARPA has allocated two grants for the development of this technology. The first grant of $ 500 000 is aimed at studying the manners typing. Another two-year grant of $ 1.76 million dollars allocated for the analysis of the methods of work with mobile devices.
For the computer to remember the one who uses it, the user must, within 90 minutes of typing, thereby showing your device style and rhythm set. The system will then be able to track who uses your computer – authorized person or an impostor.
Engineers say that their goal is the total abolition of passwords on devices and replacing them with a new system of identification . Defining user will pass completely unnoticed, and if the computer detects that a person fails authorization, the system disables the operation of the device.
Back Amazon is preparing a new Kindle Paperwhite with stunning screen
Submitted by the parties forward prototype Steam Machine
Tags: Security , Research , Technology .
Answer this Question
You must be Logged In to post an Answer.
Not a member yet? Sign Up Now »
Star Points Scale
Earn points for Asking and Answering Questions!